{
	"id": "40a65539-7359-408b-89f0-6d1296206ba1",
	"created_at": "2026-04-06T00:10:27.10716Z",
	"updated_at": "2026-04-10T03:22:09.468096Z",
	"deleted_at": null,
	"sha1_hash": "ffd1abebf4ac2474e29cc9d8904c2b382e5ac2f7",
	"title": "SpyEye Bot (Part two). Conversations with the creator of crimeware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 45093,
	"plain_text": "SpyEye Bot (Part two). Conversations with the creator of\r\ncrimeware\r\nArchived: 2026-04-05 14:33:27 UTC\r\nMalwareIntelligence is a site dedicated to research on all matters relating to anti-malware security,\r\ncriminology computing and information security in general, always from a perspective closely related to the\r\nfield of intelligence.\r\nSpyEye Bot (Part two). Conversations with the creator of crimeware\r\nIn recent weeks, SpyEye (a new financial trojan) has been the talk of many for the positive acceptance was so in\r\nthe underground scene due to its balance about cost/benefit, and the great impact that achievement to whiten the\r\nfeatures in its latest version that allows systems to eliminate the activities of your competition: ZeuS.\r\nOur previous report, “SpyEye. Analysis of a new crimeware alternative scenario,” addressed known technical\r\nissues involving the activities of this threat.\r\nIn this second part we present the exclusive interview by Ben Koehl, Crimeware Researcher of Malware\r\nIntelligence. Through interviews with the creator of crimeware, we reveal information that shows some of the\r\nthought process and brains behind the creator of SpyEye. We also see the source code for the Zeus Killer addition.\r\nThe way that Gribodemon thinks is not unique anymore in the cybercrime world. We are seeing individuals and\r\ngroups becoming more specialized in the services they provide and are no longer spreading themselves thin. There\r\nare many industries within the cybercrime world. From coding to infrastructure support to public relations.\r\nhttp://malwareint.blogspot.com/2010/02/spyeye-bot-part-two-conversations-with.html\r\nPage 1 of 2\n\nThere was a large language barrier between me and the author so I had to keep the questions short and basic so his\r\ntranslator program could handle them (Lingvo.)  We broke up the conversation in pieces to make it flow better to\r\nthe reader.\r\nThis document can be downloaded from:\r\nEnglish version\r\nSpanish version\r\nRelated information\r\nSpyEye Bot. New bot on the market\r\nCompendio Anual de Información. El crimeware durante el 2009\r\nJorge Mieres\r\nSource: http://malwareint.blogspot.com/2010/02/spyeye-bot-part-two-conversations-with.html\r\nhttp://malwareint.blogspot.com/2010/02/spyeye-bot-part-two-conversations-with.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"ETDA"
	],
	"references": [
		"http://malwareint.blogspot.com/2010/02/spyeye-bot-part-two-conversations-with.html"
	],
	"report_names": [
		"spyeye-bot-part-two-conversations-with.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434227,
	"ts_updated_at": 1775791329,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ffd1abebf4ac2474e29cc9d8904c2b382e5ac2f7.pdf",
		"text": "https://archive.orkl.eu/ffd1abebf4ac2474e29cc9d8904c2b382e5ac2f7.txt",
		"img": "https://archive.orkl.eu/ffd1abebf4ac2474e29cc9d8904c2b382e5ac2f7.jpg"
	}
}