When it was first discovered in 2012, Trusteer researchers said that Tilon was the "son" of a well-known malware called Silon. However, experts from Fox-IT say that Tilon should be called SpeEye2. (download PDF research)
Researchers believe that Tilon was created by a development team led by Russian Aleksandr Andreevich Panin (also known as "Gribodemon"). In October 2011, following the release of SpyEye 1.3.48, the team began working on a side project, a private Trojan platform for rent.
Trusteer researchers have reported that Tilon is based on Silon because of his similarity loader component. However, Fox-IT reports that Tilon's functional components are actually based on SpyEye, which means developers have access to SpyeEye's source code.
"Looking at SpyEye2 backend, a lot has changed. There is a single backend system that strongly resembles the original SpyEye RDP backconnect daemon and it contains a lot of code from it SpyEye collector, but using HTTP this time around, ”said a Fox-IT expert.
"The server side component is called "dae" (abbreviation for daemon, a common name for a Unix service, which is also used by its component RDP backconnect of SpyEye), and combines bot control, logging data, and functionality RDP and socks and the management of its structure webinject on a single platform. ”
The fact that Tilon is actually SpyEye2 is also evidenced by the fact that after the capture of Panin, a significant decrease in its activity has been observed.
In fact, now that Panin has pleaded guilty, you will probably spend many years behind bars. It is worth noting that he pleaded guilty to conspiracy to commit online banking fraud, and admitted to being the main developer and distributor of SpyEye. However, this does not necessarily mean that the rest of his team will abandon the development of malware.