IBM researchers have discovered a clever new use of the Citadel malware platform, a descendant of the Zeus Trojan, to deliver ransomware that poses as the U.S. Department of Justice and hijacks victims’ computers. This ransomware, called Reveton, freezes the compromised machine’s operating system and demands $100 to unlock it.

Reveton was observed a few weeks ago being used as a standalone attack, but it has now been coupled with the Citadel platform. This is another example of financial malware expanding beyond online banking fraud and being used as a launchpad for other types of cyber attacks. Citadel is able to target employees to steal enterprise credentials, and in this example, it targets victims directly to steal money from them rather than their financial institution.

How Does Reveton Work?

The attack begins with the victim being lured to a drive-by download website. Here, a dropper installs the Citadel malware on the target machine, which retrieves the ransomware DLL from its command-and-control center.

Once installed on the victim’s computer, the ransomware locks up the targeted machine and displays a warning message notifying the user he or she has violated U.S. federal law. The webinject screen (below) claims the infected machine’s IP address was identified by the Computer Crime & Intellectual Property Section as having visited websites that contain child pornography and other illegal content.

In order to unlock the computer, the victim is instructed to pay a $100 fine to the U.S. Department of Justice using prepaid money card services. The payment service options presented to the victim are based on the geographic location of his or her IP address. For example, users with U.S. IP addresses must pay using MoneyPak or Paysafecard.

Citadel Platform Persists

Independent of the Reveton ransomware secondary payload, Citadel continues to operate on the compromised machine on its own. Therefore, it can be used by fraudsters to commit online banking and credit card fraud by enabling the platform’s man-in-the-browser, keylogging and other malicious techniques.

It is clear from this and similar attacks we have discovered recently that financial malware has achieved a technological level of sophistication that enables it to carry out virtually any type of cyber attack. Through a combination of social engineering, data capturing and communication tampering, these attacks are being used by criminals to target applications, systems and networks that belong to financial institutions, enterprises and government agencies to commit fraud or steal sensitive information. It is important to recognize that now, more than ever, cyber crime and cyber security protection begins with the endpoint.

2014 Ponemon Study: The Economic Impact of Advanced Persistent Threats (APTs)

More from Fraud Protection

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today