- ArvindShops , Το Νο1 Ηλεκτρονικό Κατάστημα Αθλητικών ειδών στην Ελλάδα!, Αθλητικά Ρούχα , adidas Sandales Performance Own The Run Womens Tank Top , Παπούτσια & Αξεσουάρ
- Nike Air Max 90 Black Red DX9272 , SBD - Майки для бігу nike - 001 Release Date
- 001 Air Jordan 1 Zoom Comfort League of Legends World Championship 2020 For Sale3 Retro Cap And Gow OG Voodoo DZ7292 , new year deals air jordan 13 low white metallic silverpure platinum - 200 Release Date - Zion Williamson x DD1453 - SBD
- 100 - Travis Scott x Jordan Jumpman Jack Trainer Sail DR9317 , Jordan 11 Win Like 96 Gym Red Sneaker tees Black Sneakerhead Grinch - IetpShops
- Led Think Tank With Serena Williams + More – Poligo News - nike mens twilight low se skate shoe sale free - Nike Reveals Women Athlete
- Home
- About
- Articles
- Achievements
- News
- Contact
Sedulity Groups | Virtual Private Network of Airport Hacked via Citadel Malware
It sounds like an air traveler’s nightmare, Researchers at Trusteer recently uncovered a variant of the Citadel Trojan targeting the virtual private network (VPN) credentials used by employees at a major airport.The firm would not disclose the name of the airport because the situation is being investigated by law enforcement.
Many businesses use VPNs to provide outside workers with access to secure data. Incursions on these networks often involve advanced “Man in the Browser” malware such as the Citadel, Zeus, and SpyEye programs. The man-in-the-browser (MITB) assault first used form-grabbing malware, which steals data entered into web forms before it is passed over the internet, to steal the airport employees' VPN usernames and passwords, Amit Klein, Trusteer's chief technology officer, said in a blog post.
<!--more-->
<!--more-->
“This was potentially very dangerous, but we don’t know whether the attacker group was targeting the financial system of the airport for economic gain or if the attack was terrorism-related,”
The airport VPN was immediately disconnected after officials there were made aware of the breach and authorities are investigating.
The product that the airport was using to provide strong authentication for employees gave each user two choices: log in with a username and a one-time password that's sent via SMS or a smartphone app; or log in using a CAPTCHA-like image of 10 digits that the user maps to his own static password. The Citadel malware used the screen-capture tactic to defeat this.
"This security measure prevents the form grabber from capturing the actual static password. This is where the screen capturing feature in Citadel kicks in," Klein said.
Trusteer doesn't know who the attackers are and what they are after, but Kedem says they could be trying to gather intelligence on airport security processes, or even the border customs service.He says the attack appears to be very targeted, and the bottom line is that VPN connections are not safe.
In addition to using endpoint cybercrime prevention software, Kedem also advises users to abide by standard practices for preventing infection: avoid opening unknown attachments or clicking links in emails.
- Airport /
- Airport Network /
- Citadel Trojan /
- Cyber Crime /
- Cyber Crime at Airport /
- Dangerous /
- Investigation /
- Malware /
- Network Down /
- Private Network /
- Technology /
- Trojan /
- Virtual Private Network /
- VPN /
- VPN Hacking /
- VPNs /