Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43438
  • Total Topics: 16532
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2874
Total: 2877









Author Topic: Labs Paper Looks ‘Inside the World of the Citadel Trojan’  (Read 2283 times)

0 Members and 1 Guest are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 776
  • KARMA: 117
  • Gender: Male
  • Pez
Labs Paper Looks ‘Inside the World of the Citadel Trojan’

Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now taken the spotlight with the news of its withdrawal from the open crimeware market.

Recently the author of Citadel, Aquabox, has been banned from a large online forum that sells malware and other services to cybercriminals. Some in the security industry predict that this will be the downfall of the Citadel Trojan; this very well may be the case. However, at the moment McAfee Global Threat Intelligence shows that Citadel remains a very active threat and continues to target victims in several countries. As with any sophisticated malware—such as Zeus and SpyEye—that ceases development, this Trojan’s use will continue as long as it provides value to cybercriminal operations.

McAfee Labs concludes that some groups—and especially the “Poetry Group”—have shifted tactics to use Citadel in ways other than what it was originally intended for. We also see from our telemetry data gathered from the field that Citadel still remains active in many parts of the world. Read the McAfee Labs report Inside the World of the Citadel Trojan.

The Poetry Group

Summary of the group’s activity:

• 27 Japanese government offices compromised across three distinct campaigns

• 43 government offices targeted in Poland

• Victims found in Poland, Denmark, Sweden, Spain, Netherlands, Estonia, Czech Republic, Switzerland, and Japan

• More than a half-dozen campaigns conducted by this group since October 2012

• Compromised more than 1,000 victims worldwide with their campaigns
This group has been actively using Citadel to target government offices around the world since October 2012. From our field telemetry, we were able to pinpoint the regions and identify targets and victims spanning more than a half-dozen campaigns.

Our threat map shows that their focus remains on Poland and Denmark, which have the highest infection numbers. Japan is the next most popular target.


Klick the image to get it larger!

One interesting campaign that we also observed in our research infected 13 victims in Poland, all in government offices. This was a very targeted campaign indeed, focusing at first on selective targets across the country. The campaign began late in December 2012 and ended on Jan 23. Furthermore, we found a list recovered from process memory pertaining to certain city-level government domains in Poland. Many of the telemetry hits matched government offices in the targeted city, which led us to conclude that the group was using this list as a filter to target certain local government sites.

The group orchestrating these attacks embeds strings of poetry as a string-table resource in the malware binary. Many of these poetic statements are rather cryptic and are quoted from Shakespeare. At first glance they appear meaningless. However, in some cases we found political comments referencing the target country.

In one of the malware binaries, the group made a rather harsh statement toward Poland, which to date has had 379 victims of this Citadel campaign.


Klick the image to get it larger!

This type of targeted messaging goes hand in hand with another reference made toward Denmark, which followed Poland in magnitude with 218 infected victims.

After an analysis of 300 unique Citadel Trojan samples, we conclude that the poetry strings are not caused by a common tool nor or they included in Citadel by default; they are the work of the Poetry Group. We suspect that Poetry Group may be a byproduct of a for-hire data-gathering operation for a private clientele; and their tool of choice is Citadel. McAfee Labs will continue to monitor their activity.

The report is available here.


Orginal article: Thursday, January 31, 2013 at 9:55pm by Ryan Sherstobitoff
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023