


An introduction to Zeus P2P operation and behavior within the compromised PC.This paper presents a case study of mitigation strategy for the Zeus P2P Murofet, one of the most “popular” and widely diffused financial malware. Yet, detection techniques are unable to overcome advanced evasion techniques such as dynamic relocation of servers and IP anonymization strategy, which, seriously difficult the detection and mitigation tasks. Nowadays financial malware attacks are of increased sophistication and one of the major threats to e-banking security, affecting millions of financial transactions every day.
