Researchers warn of impending Ares Trojan infections

The Ares Trojan -- for sale via anonymous online money transfer --is being propagated by its unidentified developer as customizable to each of its buyers.

Researchers at German antimalware company G Data Software AG have warned of a new Trojan called Ares, which they say will begin spreading over the next few days.

The wide range of uses to which Ares can be put means it represents an extremely high risk to the public and businesses," says the company's

Eddy Willems
security evangelist
G Data Software AG

The modular design of the Ares Trojan is similar to that of the Zeus banking Trojan, which has infected millions of PCs during the last year. The design is such that cybercriminals will be able to modify the malware and adapt it to a variety of targets.

"The wide range of uses to which Ares can be put means it represents an extremely high risk to the public and businesses," says the company's security evangelist Eddy Willems.

The reason for G Data's preemptive warning is that the Ares developer -- whose identity remains unknown -- has authored a free software development kit for the Trojan. The kit is intended for so-called "trustworthy developers," provided that they pay the Ares developer a licence fee when subsequent modules are sold to third parties.

Others can buy an Ares starter kit for $820, or the full development kit for up to $6,000. Payment is made via an anonymous online payment service -- in this case WebMoney -- so that neither the purchaser nor the developer need reveal his or her true identity.

In describing the sales pitch for the malware, G Data quotes the Ares author as writing: "Every copy of Ares is unique to its customer and it has the same banking capabilities as Zeus & SpyEye, which can be added provided the customer wants it. I actually consider this more of a platform which is customized to each buyer's liking."

Willems said that, despite the amount of information known about the impending malware launch, it remains unclear who or what the Trojan's specific targets are, the mechanisms it will use, and who is behind it.

Dig deeper on Malware, Viruses, Trojans and Spyware

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close