Inner workings of Citadel malware exposed
Malwarebytes gives blow by blow account of pernicious Trojan’s code and deployment.


Anti-malware company Malwarebytes is warning consumers of the dangers around one of the Zeus crimkekit's more recent offspring, Citadel.
The Trojan is used by criminal gangs to either steal or extort money from unwitting users. Infected computers can also be turned into bots' in a botnet and silently used to proliferate the malware.
In a blog post, Malwarebytes analyst Jerome Segura has demonstrated how one of the newer version 1.3.4.5 of the Trojan, is ordered almost like a normal software from crime rings specialising in this type of cyber crime. It also demonstrates how Citadel circumvents most anti-virus programmes by blocking them before it is recognised.
Keylogging and stealing personal details can go on secretly for some time.
Citadel first appeared in January 2012 and can be used in one of two ways. The first and, according to Malwarebytes, most common function is to run silently and invisibly in the background, logging key strokes and capturing images and videos of victims computers. The primary aim of this type of attack is to covertly steal people's bank details and defraud them.
The second, less common method of attack, but one which is of greater concern to the FBI, is an extortion attack, carried out through the deployment of a ransomware known as Reveton. This program locks the computer, posing as an FBI imposed lockdown, and demands a payment in order to make it operational again.
A Malwarebytes spokesperson told IT Pro he believed the FBI was focused on the second element of the Citadel threat as it is more concerned about Reveton in general.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"[Reveton] is abusing [the FBI] brand name to extort money from people. This is obviously very serious, but is only a part of the wider Citadel threat. Keylogging and stealing personal details can go on secretly for some time, but once a piece of ransomware exposes itself then it is the final blaze of glory for any piece of malware," he said.
To avoid infection by Citadel, the spokesperson advised all PC users to use Malwarebytes Anti Malware, to ensure it is running the most up-to-date versions of all software and to avoid clicking on links they don't recognise as far as possible.

Jane McCallion is Managing Editor of ITPro and ChannelPro, specializing in data centers, enterprise IT infrastructure, and cybersecurity. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd