Researchers at IBM discovered a new variant of the Citadel banking malware which includes a new interesting feature that allows attackers to maintain persistence in the victim’s machine through remote management tools.
Citadel is directly derived from the popular Zeus banking Trojan, in June 2013 Microsoft and the FBI carried out takedowns that eradicated more than 1,400 botnets (nearly 88% of overall Citadel botnet) associated with this malware.
The new variant of Citadel detected by the experts is integrated with VNC and other remote management tools exploited by the attackers to remotely control victim machines, even after the malware has been detected and removed.
The choice of a remote management tool is not casual because applications like VNC allows attackers to avoid detection of defense systems that usually don’t block them.
“Most advanced types of malware have this ability today, including SpyEye’s use of Remote Desktop Protocol (RDP) and Zeus’ and Citadel’s use of Virtual Network Connection (VNC). The security team at Trusteer, an IBM company, has just discovered a Citadel variant that takes this approach a step further, providing enhanced survivability for the attack as well as expanding this malware’s capabilities to perpetrate targeted attacks on enterprises.” report Etay Maor in a blog post.
Once the attackers are maintaining persistence to the victim computers, they can practically do everything they need, including downloading of further malicious payloads or reinfect the PC in case the malware is spotted and removed by security defense.
Citadel variant has come bundled with VNC (Virtual Network Connection) and also with Windows shell commands giving the attackers a peek at the targeted network which host the infected machine.
This version of Citadel exploits Windows shell commands to add a new local user including it into the local administrator and Remote Desktop Protocol groups with a password that never expires.
“The attacker has set up a backup back door into the infected device,” “Attackers benefit in the following ways when utilizing such a trick, especially when they are preparing for a persistent, long-term attack against an enterprise.” added Maor.
The experts also detailed the commands that this variant of Citadel executes:
The usage of Windows RDP allows attackers to fly under the radar, differently from ways to control remotely victims and it works even if the malware is removed from the PC.
“While malware modules and communications may be more vulnerable to interception and analysis by security software, using the Windows-native RDP capabilities may fly under the radar as some companies actually use this exact same protocol for technical support,” Maor said.
Resuming, this variant of Citadel represents an ideal choice to compromise enterprises in a persistent and long-term attacks. The experts listed the advantages of the choice:
[adrotate banner=”9″]
Security Affairs – (malware, Citadel)
[adrotate banner=”13″]