Hackers use Citadel Malware to attack password management apps

IBM’s Trusteer researchers have discovered a new configuration of the
Citadel malware that attacks certain password managers. The
configuration activates key logging when certain processes are running
on the infected machine.

The targeted processes include Password Safe, and KeePass, two open-source password managers. The variant also targets the nexus Personal Security Client used to secure financial transactions and other services that require heightened security.

Password managers have become popular in the wake of breaches that have exposed millions of end-user credentials. Users collect all their passwords in a “vault” that is protected by a master password. In addition to added security, users can devise long and complex passwords that are hard to guess and that they don’t have to remember since the password manager fills in the password field on the user’s log-on screen.

IBM discovered the variant on a machine that was protected by IBM Trusteer, a suite of security software. IBM bought the Israel company in Sept. 2013 for $1 billion.

The researchers say they are unsure how the variant got on the machine. In addition, the researchers said they did not know if it was an attack with a specific target or a random expedition by attackers to find what types of data they could collect.

“Password management and authentication programs are important solutions that help secure access to applications and Web Services,” Dana Tamir, director of enterprise security at Trusteer, wrote on IBM’s Security Intelligence blog. “If an adversary is able to steal the master password and gains access to the user/password database of a password management solution or compromise authentication technology, the attacker can gain unfettered access to sensitive systems and information.”

The Citadel Trojan is not new. It is a massively broadcast malware
that has already compromised millions of computers worldwide. Once
Citadel installs on a machine, it opens advice channels with a
command-and-control (C&C) server and registers with it. The malware
again receives a agreement book that tells it how it should operate,
which targets what to attending for, what blazon of advice to capture,
which functions to accredit and even provides advice about another
C&Cs that acquiesce the attackers to yield down an apparent C&C
and still accomplish the malware from a new C&C. As continued as the
malware is communicating with the C&C, the agreement book can be
adapted with advice about new targets, activities and C&C

Read full Article at ZDNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...