• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Hackers' Citadel and Koobface Trojans pose major threats to business data

Citadel evolves past financial focus while resurrected Koobface worm burrows deeper into Facebook systems

Data security
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 03 June 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Cyber criminals are using evolved versions of old attack tools to expand their operations, according to security firm McAfee.

McAfee listed tweaked versions of the Citadel and Koobface Trojans as two of the biggest threats facing businesses in its Q1 2013 Threat Report on Monday. The firm said the Citadel Trojan is particularly dangerous as crooks had developed it to steal a more diverse pool of data from its victims, making it one of 2013's most dangerous emerging threats.

"Citadel is considered an emerging threat to not only the financial services industry, but to other industries as well. Citadel gives cyber criminals advanced remote connectivity, and it also gives them the ability to dynamically decide which target to engage," said the report.

"There is a significant amount of recent activity to suggest that perpetrators will continue to use Citadel to attack businesses and government organisations around the world."

McAfee researchers also detected a surprise spike in the number of attacks using the 2008 Koobface Trojan to target social networks. McAfee Labs senior vice president, Vincent Weafer said the attacks on Facebook are troublesome as they could lead to more serious breaches on company networks. "Cyber criminals have come to appreciate that sensitive personal and organisational information are the currency of their ‘hacker economy'," said Weafer.

"The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information. Within the enterprise, we see password-stealing Trojans evolving to become information-gathering tools for cyber espionage attacks. Whether they target login credentials or intellectual property and trade secrets, highly-targeted attacks are achieving new levels of sophistication."

Outside of Citadel and Koobface the firm also detected a marked increase in the number of spam campaigns targeting corporate data. "One of the biggest stories this quarter is the increase in spam after more than a year of decline. We counted 1.9 trillion messages in March. That's lower than record levels but about twice the volume of December 2012. Cybercriminals continue to develop and market crimeware tools, which make it easy for inexperienced scammers to join the ranks and exploit victims," said the report.

The quarter also saw yet another boom in the number of mobile malware families operating in the wild. "Our count of mobile malware samples, just about exclusively for the Android OS, continues to skyrocket. Almost 30 percent of all mobile malware appeared this quarter. Malicious spyware and targeted attacks highlighted the latest assaults on mobile phones. All malware that we track affecting clients, servers, networks, mobiles-now stands at more than 128 million samples," reads the report.

McAfee's findings mirror those of numerous other security firms. Most recently Russian competitor Kaspersky confirmed detecting 22,750 versions of evolved mobile malware in its Q1 2013 Threat Report earlier this year.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Operating Systems
  • Finance
  • Hacking
  • malware
  • McAfee
  • cyber-crime

V3 Latest

Microsoft Windows 10 on a laptop
How to fix the Windows 10 Anniversary Update

Tips to get your PC back in order if the Anniversary Update has created problems

  • Operating Systems
  • 11 August 2016
Android logo
Google fined £5.2m for Android antitrust violations in Russia

Firm has also been ordered to change its agreements with device makers

  • Law
  • 11 August 2016
brexit-shutterstock-417868516
Brexit: Tech sector loses confidence in UK after Leave vote

Survey of techUK members finds despondency among cutting-edge firms

  • Government
  • 11 August 2016
Galaxy Note 5 vs Galaxy Note 7
Galaxy Note 7 vs Galaxy Note 5

How does the new Galaxy Note compare with its predecessor?

  • Mobile Phones
  • 11 August 2016
blog comments powered by Disqus
Back to Top

Most read

TechEd 2014 Microsoft logo
Patch Tuesday: Microsoft releases nine updates as yearly total passes 100
credit-card
Oracle hack potentially compromises almost every US credit card
Apple iPhone SE 10 most exciting features
Apple iOS market share grows on iPhone SE success
iPhone 7 rose gold
iPhone 7: 10 key features Apple's next smartphone needs to have
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016