BitDefender releases emergency ZBot removal tool

September 2010 Cyber Security

Standalone utility available for download free of charge on Malwarecity.

BitDefender has posted a removal tool for the infamous ZBot.

While ZBot or ZeusBot focuses mainly on the online banking details that users input on financial organisations’ pages, it also monitors system information and steals additional authentication credentials. The latest variants are also able to gather the history of the visited Web sites and other data users provide online, while also capturing screenshots of their desktops. ZBot is distributed mainly via spam campaigns and Web pages which host its malicious payload, usually under the guise of a popular legitimate application.

“As a part of its ongoing efforts to inform, educate and help users worldwide in their fight against e-threats, BitDefender has created a ZBot Removal Tool. The removal tool checks users’ computers, detects and eliminates most of the ZBot variants spotted in the wild and it is available for download free of charge,” said Catalin Cosoi, head of the BitDefender Online Threats Lab.

ZBot Removal Tool can be downloaded from the Removal Tools section of, a BitDefender initiative for the software security community and a free resource for those interested in their online security.

“As ZBot is one of the most prolific breeds of malware and new variants appear every day, we strongly suggest that computer users regularly return to our removal tool page on for additional updates of the ZBot Removal Tool. Users of the BitDefender antimalware suites are already protected by state-of-the-art defensive technology,” added Cosoi.

To make sure that your system is always safe and secured, we strongly recommend that you consider installing and using a comprehensive antimalware suite. You can download and try any BitDefender security solution for 30 days free of charge.

For more information contact Alina Anton, senior PR & marketing coordinator, EMEA & APAC Business Unit, BitDefender, +40 212 063 470, [email protected],

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Defining the resilience of cybersecurity
Cyber Security Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

How to stay cybersafe on business trips
Cyber Security
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

How safe are your backups?
Technews Publishing Cyber Security
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Growing cyber resilience portfolio
Technews Publishing Cyber Security
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Adopting a cyber-secure mindset
Security Services & Risk Management Cyber Security
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Reversing the hidden risk of permission creep
Cyber Security
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Mitigating the risk of zero-day attacks against Microsoft 365
J2 Software Cyber Security
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.