When it was first discovered in 2012, Trusteer researchers said that Tilon is the "son" of a well-known malware called Silon. However, the experts from Fox-IT mention that Tilon should be called SpeEye2. (download PDF research)
Researchers believe that Tilon was created by a development team headed by Russian Aleksandr Andreevich Panin (aka “Gribodemon”). In October 2011, after the release of SpyEye 1.3.48, the team started working on a side project, of a private one platformTrojans for rent.
Trusteer researchers have reported that Tilon is based on Silon because of his similarity loader component. However, Fox-IT reports that Tilon's functional components are actually based on SpyEye, which means developers have access to SpyeEye's source code.
"Looking at SpyEye2 backend, a lot has changed. There is a single backend system that strongly resembles the original SpyEye RDP backconnect daemon and it contains a lot of code from it SpyEye collector, but using HTTP this time around, ”said a Fox-IT expert.
"The server side component is called "dae" (abbreviation for daemon, a common name for a Unix service, which also usesfrom its component RDP backconnect of SpyEye), and combines bot control, the data recording, its functionality RDP and socks and the management of its structure webinject on a single platform. ”
The fact that Tilon is actually SpyEye2 is also evidenced by the fact that after the capture of Panin, a significant decrease in its activity has been observed.
In fact, now that Panin has pleaded guilty, you will probably spend many years behind bars. It is worth noting that he pleaded guilty to conspiracy to commit online banking fraud, and admitted to being the main developer and distributor of SpyEye. However, this does not necessarily mean that the rest of his team will abandon the development of malware.