Citadel: a cyber-criminal’s ultimate weapon?
Jump to navigation
Jump to search
(Publication) Google search: [1]
Citadel: a cyber-criminal’s ultimate weapon? | |
---|---|
Botnet | Citadel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-05 |
Editor/Conference | Malwarebytes |
Link | http://blog.malwarebytes.org/intelligence/2012/11/citadel-a-cyber-criminals-ultimate-weapon/ (Archive copy) |
Author | Jérôme Segura |
Type |
Abstract
“ Stolen credentials are harvested by various means:
Keystroke logging Screenshot capture Video capture A powerful feature used to trick users into revealing confidential information is dubbed WebInject. It is powerful because it happens in real time and is completely seamless. A WebInject is a piece of code that contains HTML and JavaScript which creates a fake pop-up that asks the victim for personal information within the context of logging into a site. The bad guys can trigger it in two ways: either automatically when a site of interest is opened by the victim, or manually on the fly.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1209, editor = {Malwarebytes}, author = {Jérôme Segura}, title = {Citadel: a cyber-criminal’s ultimate weapon?}, date = {05}, month = Nov, year = {2012}, howpublished = {\url{http://blog.malwarebytes.org/intelligence/2012/11/citadel-a-cyber-criminals-ultimate-weapon/}}, }