|Title||Understanding and mitigating banking trojans: From Zeus to Emotet|
|Publication Type||Conference Paper|
|Year of Publication||2021|
|Authors||Grammatikakis K-P, Koufos I, Kolokotronis N, Vassilakis C, Shiaeles S|
|Conference Name||Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience|
|Keywords||Cyber security, Graphical security models, Intrusion response systems, Malware analysis, Reverse engineering|
Banking Trojans came a long way in the past decade, and the recent case of Emotet showed their enduring relevance. The evolution of the modern computing landscape can be traced through Emotet and Zeus, both representative examples from the end of the past decade. As an example of earlier malware, Zeus only needed to employ simple anti-analysis techniques to stay undetected; while the more recent Emotet had to constantly evolve to stay a step ahead. Current host-based antimalware solutions face an increasing number of obstacles to perform their function. A multi-layer approach to network security is necessary for network-based intrusion response systems to secure modern networks of heterogeneous devices. A system based on a combination of a graphical network security model and a game theoretic model of cyber attacks was tested on a testbed with Windows machines infected with Trojans; experimental results showed that the proposed system effectively blocked Trojans’ network communications effectively preventing data leakage and yielding encouraging results for future work.