Inner workings of Citadel malware exposed
Malwarebytes gives blow by blow account of pernicious Trojan’s code and deployment.
Anti-malware company Malwarebytes is warning consumers of the dangers around one of the Zeus crimkekit's more recent offspring, Citadel.
The Trojan is used by criminal gangs to either steal or extort money from unwitting users. Infected computers can also be turned into bots' in a botnet and silently used to proliferate the malware.
In a blog post, Malwarebytes analyst Jerome Segura has demonstrated how one of the newer version 18.104.22.168 of the Trojan, is ordered almost like a normal software from crime rings specialising in this type of cyber crime. It also demonstrates how Citadel circumvents most anti-virus programmes by blocking them before it is recognised.
Keylogging and stealing personal details can go on secretly for some time.
Citadel first appeared in January 2012 and can be used in one of two ways. The first and, according to Malwarebytes, most common function is to run silently and invisibly in the background, logging key strokes and capturing images and videos of victims computers. The primary aim of this type of attack is to covertly steal people's bank details and defraud them.
The second, less common method of attack, but one which is of greater concern to the FBI, is an extortion attack, carried out through the deployment of a ransomware known as Reveton. This program locks the computer, posing as an FBI imposed lockdown, and demands a payment in order to make it operational again.
A Malwarebytes spokesperson told IT Pro he believed the FBI was focused on the second element of the Citadel threat as it is more concerned about Reveton in general.
"[Reveton] is abusing [the FBI] brand name to extort money from people. This is obviously very serious, but is only a part of the wider Citadel threat. Keylogging and stealing personal details can go on secretly for some time, but once a piece of ransomware exposes itself then it is the final blaze of glory for any piece of malware," he said.
To avoid infection by Citadel, the spokesperson advised all PC users to use Malwarebytes Anti Malware, to ensure it is running the most up-to-date versions of all software and to avoid clicking on links they don't recognise as far as possible.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download