IBM recently discovered a configuration of the Citadel malware that targets Facebook users with a fake request for donations to children’s charities in order to steal credit card data.

Different Messaging for Different Users

After users have logged in to their Facebook account, the Citadel injection mechanism displays a pop-up that encourages them to donate $1 to a fake fund for children who are in need of humanitarian aid. Then, it asks them to fill in their credit card details. The malware is configured to deliver the targeted attack based on the user’s country and language settings with webinjection pages in five different languages: English, Italian, Spanish, German and Dutch.

In an interesting twist, the malware’s authors do not reuse the same text for every language. Instead, they have customized the messages of each attack based on each victim’s country and/or region.

Here are the webinjections used for each language:

English Attack

In the English-language version of this attack, users are asked to make a $1 donation for Haitian children living in poverty. The scam claims that the donation goes to children in orphanages and underserved elementary schools. Scammers lure users into submitting their credit/debit card details by filling out a form that asks for their name, card number, expiration date, CVV and security password.

Italian Attack

In the Italian version, cyber criminals exploit the Red Balloon campaign, which was created to fight child mortality in Italy. The authors claim that the campaign has already collected more than 1 million euros for sick children and warn that more than 7 million children die from basic illnesses every year.

Spanish Attack

Upon examination of the Spanish attack, IBM discovered a bug in the injection code that defaults to the English version of the text. However, the fraudsters’ intention with this version was to exploit a well-known Spanish nutrition program for infants and children. The program collects donations to purchase and distribute milk to needy children. It even sends victims pictures of individuals who supposedly already gave money.

German Attack

In the German-language attack, fraudsters urge Facebook users to make a donation to ChildFund, which helps families provide a better future for their children.

Dutch Attack

In the Dutch version of the attack, the criminals request that victims make a donation to Save the Children, an organization that has been working for 90 years to improve the lives of underprivileged children.

This attack illustrates the continuing customization of financial malware and harvesting of credit card data from Facebook’s global base of users. Using children’s charities in this scam makes the attack believable and effective, while the $1 donation amount is low enough that virtually all Facebook users can be encouraged to contribute. This is a well-designed method for stealing credit and debit card data on a massive scale.

More from Malware

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security research draws another link between the Raspberry Robin infections and the Russia-based cybercriminal group 'Evil Corp,' which is the same…