Anatomy of a Breach

Anatomy of a Breach: Operation Trident Breach — The Zeus Botnet's £60 Million Banking Heist

> series: anatomy_of_a_breach —— part: 023 —— target: global_banking —— stolen: £60,000,000 —— arrested: 100+<span class="cursor-blink">_</span>_

Hedgehog Security 30 November 2010 13 min read

The trojan that stole £60 million from your bank account.

In September and October 2010, a coordinated international law enforcement operation — Operation Trident Breach — resulted in the arrest of over 100 people across the United States, United Kingdom, Ukraine, and the Netherlands in connection with a Zeus botnet operation that had stolen an estimated £60 million ($70 million) from bank accounts worldwide. The UK's Metropolitan Police arrested 19 people in London — many of them money mules who had received stolen funds into their personal bank accounts and transferred them overseas.

Zeus (also known as Zbot) was the most successful banking trojan in history. First identified in 2007, it infected millions of computers worldwide and was used to steal online banking credentials through a combination of keylogging (recording keystrokes as victims typed their passwords) and form-grabbing (intercepting data submitted through banking website login forms). The malware was available as a commercial toolkit — purchasable on underground forums for $3,000–$4,000 — enabling anyone with criminal intent and modest technical skills to deploy their own banking fraud operation.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

19 arrests in London and the money mule network.

The UK arrests were conducted by the Metropolitan Police's Central e-Crime Unit (PCeU), which had been tracking a Zeus operation targeting UK bank accounts. The 19 people arrested in London were primarily money mules — individuals recruited (often through fake job advertisements) to receive stolen funds into their personal bank accounts and then transfer the money overseas via wire transfer or cash withdrawal, retaining a percentage as commission.

The money mule network was a critical component of the Zeus operation's logistics. Once banking credentials were stolen and used to initiate fraudulent transfers, the funds needed to be moved quickly through accounts that were not directly linked to the criminals. The mules provided this laundering layer — often unknowingly at first, recruited through advertisements for 'payment processing agents' or 'financial transfer assistants'. Our financial services sector analysis examines why banking fraud remains one of the most persistent threats to the sector.


The banking trojan that saw everything.

Keylogging and Form Grabbing
Zeus captured banking credentials through two primary methods: keylogging (recording every keystroke on the infected machine) and form grabbing (intercepting data submitted through web forms before it was encrypted by HTTPS). This meant that even banks using HTTPS were not protected — the data was captured before encryption at the browser level.
Man-in-the-Browser Attacks
Advanced Zeus variants could modify banking websites in real-time as they were displayed in the victim's browser — injecting additional form fields to capture security codes, modifying transaction details, or hiding fraudulent transactions from the victim's account view. This man-in-the-browser capability made Zeus particularly difficult for victims to detect.
Crimeware-as-a-Service
Zeus was sold as a commercial toolkit — a complete banking fraud platform available to anyone willing to pay $3,000–$4,000. The toolkit included a builder for creating customised variants, a control panel for managing infected machines, and configuration files that targeted specific banks. This was cybercrime industrialised — the same <a href="/blog/anatomy-of-a-breach-mariposa-botnet">malware-as-a-service model</a> we saw with Mariposa.
Phishing Distribution
Zeus was primarily distributed through phishing emails — messages that appeared to come from banks, tax authorities, or parcel delivery services, containing attachments or links that installed the malware. Phishing remains the number one attack vector, and our <a href="/penetration-testing/social-engineering">social engineering assessments</a> test your staff's resilience to exactly these techniques.

Protecting against banking trojans.

Zeus and its successors (SpyEye, Emotet, TrickBot) have evolved continuously, but the defence fundamentals remain constant: prevent initial infection through email security and staff awareness, detect infections through endpoint monitoring, prevent credential theft through multi-factor authentication, and detect fraudulent transactions through behavioural analytics.

Cyber Essentials certification establishes the baseline controls — patching, malware protection, access control — that reduce Zeus infection risk. Our social engineering assessments test whether your staff would click the phishing emails that distribute banking trojans. SOC in a Box provides 24/7 monitoring that detects botnet command-and-control communications, credential theft indicators, and anomalous network activity. And UK Cyber Defence's threat intelligence provides the early warning of campaigns targeting your sector.


Zeus stole £60 million. Its successors are still active today.

Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> test your resilience to the phishing campaigns that distribute banking trojans. <a href="/cyber-essentials">Cyber Essentials</a> establishes baseline malware protection. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects infections and C2 communications. Because Zeus may have a new name, but it has not gone away.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles