The source code and a manual for the Zeus crimeware framework have been leaked, allowing defenders a peak inside the infamous crime kit's infrastructure but perhaps giving attackers better ideas. The source code and a manual to the popular crimeware creation kit Zeus has been leaked, perhaps giving defenders additional tools to fight infections but also raising concerns that criminals may use the source code to create a rapidly expanding compendium of variants.Nearly a week ago, copies of the source code to Zeus appeared on the Internet, according to Danish security firm CSIS. The release comes about the same time that a manual describing Zeus’s functionality also appeared on the Web. While having access to the source code could be a boon to researchers, security professionals also worried that having access to the code could result in a spurt of innovation among criminals.“It remains to be seen whether we see different flavors of Zeus appearing over the next few days, weeks or even months,” says Paul Wood, senior analyst with Symantec.cloud. “Of course, the ability then is for the other bad guys to take advantage of some of the technology that they don’t have in their tool kit and build that into their own technology, because there are certainly a quite a lot of interesting features in the Zeus toolkit.” In 2004, the creator of the Agobot bot software posted his code to the public. Soon after, Agobot variants skyrocketed, turning the code for the software into one of the largest families of malware detected on the Internet. Zeus is already popular and is frequently used as the means to steal money from victims’ bank accounts. Yet, the source code could help criminals create more variations on the source code, says Wood.The release of the code comes around the same time as the publication of a manual for the software. In a tweet on Wednesday, Mikko Hyponnen, chief research officer for security firm F-Secure, highlighted the document. “Gives a good idea on how organized these guys are,” he posted.Yet, the public outing of both the source code and manual can help defenders create better ways of detecting variants of the Zeus code, says Symantec.cloud’s Wood.“The other side of the coin really is the ability to understand how these components are generated by looking at the source code, which enables us to put in place better rules to identify that type of malicious activity,” Wood says. “If we can understand a bit about how they work, that allows us to build better rules to detect them. Unfortunately, the code has not yet revealed much about the author or authors. In an analysis posted on Wednesday, Derek M. Jones, a visiting professor at Kingston University focusing on forensics software engineering, concluded that there is a single author who had some professional development experience and had very strong English skills. Extending those conclusions is difficult, he says.“There has been some research where people have tried to do some author attribution,” he says. “But the problem is that people look for patterns, but in code, there is not a lot of patterns.”Or, as F-Secure Hypponen deadpans, “They’re Russian. That should help us a lot in finding them.” Related content feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff 30 Aug 2024 8 mins Technology Industry IT Skills Events feature What is OWASP? A standard bearer for better web application security The Open Web Application Security Project (OWASP) is an international nonprofit dedicated to providing free documentation, tools, videos, and forums for anyone interested in improving the security of their web applications. By Linda Rosencrance 28 Aug 2024 8 mins Internet Security IT Skills Application Security opinion Bug bounty programs take root in Russia — with possible far-reaching implications International sanctions, IT isolation, and shifting attitudes to ethical hacking have bug bounty programs on the rise in Russia, with zero-day acquisition companies potentially poised to profit. By Sarah Wiedemar 27 Aug 2024 7 mins Technology Industry Application Security analysis IoT-Devices - Security-Herausforderungen und Lösungen Das Internet der Dinge (IoT) bietet viele Vorteile, bringt aber auch Sicherheitsrisiken mit sich. Erfahren Sie, wie Sie diese Herausforderungen meistern. By Sabine Frömling 09 Aug 2024 6 mins Application Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe