Zeus Trojan : Fake LinkedIn Email Spreads it, Steals Passwords and Bank Account Information

WARNING:

If you've recently received a suspicious-looking e-mail from LinkedIn that looked like this --

zeus trojan
Photo and Story Source: Cisco

then you may have been targeted by Zeus Trojan.

These Trojan carrying e-mails, which reached billions of Windows users across the planet last September 30, 2010, looked like your typical LinkedIn invite. The fake emails asked users to click on a link to confirm a request but instead sent the unsuspecting recipients to a page flashing "Please waiting .... 4 seconds." It is during this short time frame that Zeus Trojan infiltrated the user's computer system via a malicious Javascript and hid in various processes running on the targeted PC.

"This advanced cybercrime ring is a disturbing example of organized crime in the 21st Century; high tech and widespread," shared New York District Attorney Cyrus Vance in a statement.

According to various complaints filed and unsealed in Manhattan federal court, defendants used the Zeus Trojan program to steal personal information found in the computer and in the online activities of users and then used the info to hack into and transfer money out of victims' bank accounts to the co-conspirators' bank accounts.

What to do to protect your computer against this dreadful Zeus Trojan?

Given the stealthy nature of this trojan, it can be difficult to know if a PC has been infected. However, keeping your antivirus and other security programs and softwares up to date, making sure that Adobe Reader, Adobe Flash and Java have the latest security updates and scanning your computer for viruses and malware can help limit its nefarious activities. Hopefully.