The rootkit works on 32-bit and 64-bit Windows versions and protects the malware's components from being deleted.
Researchers used a specially-crafted virus called ‘Chameleon’ to attack access points, which could then spread the malware along wirelessly.
Using TOR makes it more difficult to trace the command-and-control server
Around 350,000 credit and debit cards were exposed in the incident -- not 1.1 million as first feared.
What's in a name? For one security expert, not enough when the name is "malware."
Where's My Droid and Speed Night were cited as the most downloaded malicious apps.
Analysis finds that Google Play still battles apps bearing malware, but the estimates vary with the research.
The exploit is embedded into documents distributed as email attachments, researchers from Kaspersky Lab said.
Other cryptographers were also targeted by the same attackers, the researcher said
Zeus is encrypted and contained in an ".enc" file, which security products allow through, according to Malcovery Security.