A new Citadel trojan variant includes different remote management tools to maintain persistence on victims PC

Experts at IBM discovered a new variant of Citadel banking malware which includes different remote management tools to maintain persistence on victims’ PC.

Researchers at IBM discovered a new variant of the Citadel banking malware which includes a new interesting feature that allows attackers to maintain persistence in the victim’s machine through remote management tools.

Citadel is directly derived from the popular Zeus banking Trojan, in June 2013 Microsoft and the FBI carried out takedowns that eradicated more than 1,400 botnets (nearly 88% of overall Citadel botnet) associated with this malware.

The new variant of Citadel detected by the experts is integrated with VNC and other remote management tools exploited by the attackers to remotely control victim machines, even after the malware has been detected and removed.

CitadelCitadel

The choice of a remote management tool is not casual because applications like VNC allows attackers to avoid detection of defense systems that usually don’t block them.

Most advanced types of malware have this ability today, including SpyEye’s use of Remote Desktop Protocol (RDP) and Zeus’ and Citadel’s use of Virtual Network Connection (VNC). The security team at Trusteer, an IBM company, has just discovered a Citadel variant that takes this approach a step further, providing enhanced survivability for the attack as well as expanding this malware’s capabilities to perpetrate targeted attacks on enterprises.” report Etay Maor in a blog post.

Once the attackers are maintaining persistence to the victim computers, they can practically do everything they need, including downloading of further malicious payloads or reinfect the PC in case the malware is spotted and removed by security defense.

Citadel variant has come bundled with VNC (Virtual Network Connection) and also with Windows shell commands giving the attackers a peek at the targeted network which host the infected machine.

This version of Citadel exploits Windows shell commands to add a new local user including it into the local administrator and Remote Desktop Protocol groups with a password that never expires.

“The attacker has set up a backup back door into the infected device,” “Attackers benefit in the following ways when utilizing such a trick, especially when they are preparing for a persistent, long-term attack against an enterprise.” added  Maor.

The experts also detailed the commands that this variant of Citadel executes:

  1. net user coresystem Lol117755C /add – Add a new Windows local user (username: “coresystem,” password: “Lol117755C”)
  2. net localgroup Administrators coresystem /add – Add the new user to the local administrator group
  3. net localgroup ‘Remote Desktop Users’ coresystem /add – Add the new user to the local RDP group
  4. net accounts /maxpwage:unlimited – Set the password to never expire

The usage of Windows RDP allows attackers to fly under the radar, differently from ways to control remotely victims and it works even if the malware is removed from the PC.

“While malware modules and communications may be more vulnerable to interception and analysis by security software, using the Windows-native RDP capabilities may fly under the radar as some companies actually use this exact same protocol for technical support,” Maor said.

Resuming, this variant of Citadel represents an ideal choice to compromise enterprises in a persistent and long-term attacks. The experts listed the advantages of the choice:

  • Persistency: Even if Citadel (and its VNC module) are lost, the attacker can still use RDP to access the device.+
  • The illusion of safety: A user who detect and remove Citadel will have the illusion to be safe.
  • Flying under the radar: Windows-native RDP capabilities may fly under the radar, especially for enterprises which use this protocol for maintenance.

[adrotate banner=”9″]

Pierluigi Paganini

Security Affairs – (malware, Citadel)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

11 hours ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

16 hours ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

2 days ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

2 days ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

2 days ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

3 days ago