The Zeus banking malware uses webinjects, form grabbing, keylogging, and other functionality to steal credentials, personally identifiable information (PII), and ultimately money from its victims. It has been a fixture within the cybercrime landscape since 2006. With the release of its source code in 2011, Zeus has splintered into many different malware families.
The goal of the zeusmuseum. is to find, categorize, and lightly document every version of these Zeus-derived families. There are currently 36 families (0 active), 573 versions, 5 deep dives, 441 curated references, 72669 samples, and 0 notable actors in the museum.