<s>
GameOverZeus	B-Application
is	O
a	O
peer-to-peer	O
botnet	B-Architecture
based	O
on	O
components	O
from	O
the	O
earlier	O
ZeuS	O
trojan	O
.	O
</s>
<s>
It	O
is	O
believed	O
to	O
have	O
been	O
spread	O
through	O
use	O
of	O
the	O
Cutwail	O
botnet	B-Architecture
.	O
</s>
<s>
Unlike	O
its	O
predecessor	O
the	O
ZeuS	O
trojan	O
,	O
Gameover	B-Application
ZeuS	I-Application
uses	O
an	O
encrypted	O
peer-to-peer	O
communication	O
system	O
to	O
communicate	O
between	O
its	O
nodes	O
and	O
its	O
command	O
and	O
control	O
servers	O
,	O
greatly	O
reducing	O
its	O
vulnerability	O
to	O
law	O
enforcement	O
operations	O
.	O
</s>
<s>
The	O
algorithm	O
used	O
appears	O
to	O
be	O
modeled	O
on	O
the	O
Kademlia	B-Operating_System
P2P	I-Operating_System
protocol	I-Operating_System
.	O
</s>
<s>
Scammers	O
control	O
and	O
monitor	O
Gameover	B-Application
ZeuS	I-Application
via	O
command	O
and	O
control	O
(	O
C&C	O
)	O
servers	O
.	O
</s>
<s>
According	O
to	O
a	O
report	O
by	O
Symantec	O
,	O
Gameover	B-Application
ZeuS	I-Application
has	O
largely	O
been	O
used	O
for	O
banking	O
fraud	O
and	O
distribution	O
of	O
the	O
CryptoLocker	O
ransomware	O
.	O
</s>
<s>
In	O
early	O
June	O
2014	O
,	O
the	O
U.S.	O
Department	O
of	O
Justice	O
announced	O
that	O
an	O
international	O
inter-agency	O
collaboration	O
named	O
Operation	O
Tovar	O
had	O
succeeded	O
in	O
temporarily	O
cutting	O
communication	O
between	O
Gameover	B-Application
ZeuS	I-Application
and	O
its	O
command	O
and	O
control	O
servers	O
.	O
</s>
<s>
This	O
was	O
an	O
effort	O
to	O
shut	O
down	O
the	O
Evgeniy	O
Mikhailovich	O
Bogachev	O
criminal	O
infrastructure	O
and	O
liberate	O
computers	O
infected	O
with	O
GameOver	B-Application
ZeuS	I-Application
.	O
</s>
<s>
Bitdefender	B-Application
has	O
identified	O
two	O
Gameover	B-Application
ZeuS	I-Application
variants	O
in	O
the	O
wild	O
:	O
one	O
of	O
them	O
generates	O
1,000	O
domains	O
per	O
day	O
and	O
the	O
other	O
generates	O
10,000	O
per	O
day	O
.	O
</s>
<s>
On	O
24	O
February	O
2015	O
,	O
the	O
FBI	O
announced	O
a	O
reward	O
of	O
up	O
to	O
$3	O
million	O
in	O
exchange	O
for	O
information	O
regarding	O
alleged	O
Russian	O
cybercriminal	O
Evgeniy	O
Mikhailovich	O
Bogachev	O
(	O
also	O
known	O
online	O
as	O
"	O
Slavik	O
"	O
,	O
"	O
lucky12345	O
"	O
,	O
"	O
Pollingsoon	O
"	O
,	O
"	O
Monstr	O
"	O
,	O
"	O
IOO	O
"	O
and	O
"	O
Nu11	O
"	O
)	O
over	O
his	O
suspected	O
association	O
with	O
Gameover	B-Application
ZeuS	I-Application
.	O
</s>
