@CloudExpo Authors: Liz McMillan, Yeshim Deniz, Pat Romanski, Zakia Bouachraoui, Elizabeth White

News Feed Item

AhnLab Announces the Full Analysis of Citadel Malware

AhnLab, Inc. (KRX:053800)(http://global.ahnlab.com), a leading provider of integrated security solutions today announced the full analysis of Citadel malware, the latest generation of banking information-stealing malware.

The most famous banking-targeted malware before Citadel was Zeus and SpyEye Trojan. After the source code of Zeus went public in 2011, Citadel is emerged as the most dominating malware with enhanced malicious functions.

According to AhnLab, Citadel has many things in common with Zeus. It creates and manages the botnet, a collection of internet-connected computers those are infected with malware. It is designed to collect personal information from infected PCs including online banking information, web browser credential and SNS account data. The malware also delivers ransomeware and scareware from attacker in attempts to extort money directly from victims.

In terms of info-stealing, Citadel surpasses Zeus. Both malwares collect and leak basic information of infected PC, including OS information, data of web browser in use, system time, and user admin name before they steal banking credential. Citadel, in addition to the basic information, leaks more comprehensive information of infected PC including domain information of local network, the list of data base servers, network configuration information and homepage setting information. With these information gathered, the attacker can design more targeted threats.

Citadel is provided in a Software-as-a-Service (SaaS) model, as it has its own store, and customers can manage the malware from creation to maintenance. The store offers the Citadel builder, botnets paying in monthly basis, update service, a test to avoiding AV and many other features. It indicates a recent trend of the cybercrime ecosystem.

AhnLab’s AOS provides integrated and multi-layered transaction security against comprehensive security threats. With its four primary components including AOS Secure Browser, a dedicated security browser that creates a protected environment for online transactions, AOS Anti-keylogger, AOS Firewall and antivirus, prevent confidential data loss through this kind of advanced and targeted attack from sophisticated malware such as Zeus, SpyEye and Citadel. After the full analysis of Citadel malware, AhnLab keeps working on analysis of possible Citadel variants.

AhnLab’s AOS is selected by the several world’s most famous banks including Citibank Korea, Banamex, Banco Santander in Mexico and Cornerstone Community Bank in US.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogger and is a frequent speaker on the use of Big Data and data science to power the organization's key business initiatives. He is a University of San Francisco School of Management (SOM) Executive Fellow where he teaches the "Big Data MBA" course. Bill was ranked as #15 Big Data Influencer by Onalytica. Bill has over three decades of experience in data warehousing, BI and analytics. He authored E...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the massive amount of information associated with these devices. Ed presented sought out sessions at CloudEXPO Silicon Valley 2017 and CloudEXPO New York 2017. He is a regular contributor to Cloud Computing Journal.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. End users now struggle to navigate multiple environments with varying degrees of performance. Companies are unclear on the security of their data and network access. And IT squads are overwhelmed trying to monitor and manage it all.