{"id":8449,"date":"2017-07-25T10:17:19","date_gmt":"2017-07-25T18:17:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/25\/news-2223\/"},"modified":"2017-07-25T10:17:19","modified_gmt":"2017-07-25T18:17:19","slug":"news-2223","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/25\/news-2223\/","title":{"rendered":"How a Citadel Trojan Developer Got Busted"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 25 Jul 2017 16:11:38 +0000<\/strong><\/p>\n<p>A U.S. District Court judge in Atlanta last week handed a five year prison sentence to <strong>Mark Vartanyan<\/strong>, a Russian hacker who helped develop and sell the once infamous and widespread <strong>Citadel<\/strong> banking trojan. This fact has been reported by countless media outlets, but far less well known is the fascinating backstory about how Vartanyan got caught.<\/p>\n<p>For several years, Citadel ruled the malware scene for criminals engaged in stealing online banking passwords and emptying bank accounts. U.S. prosecutors say Citadel infected more than 11 million computers worldwide, causing financial losses of at least a half billion dollars.<\/p>\n<p>Like most complex banking trojans, Citadel was marketed and sold in secluded, underground cybercrime markets. Often the most time-consuming and costly aspect of malware sales and development\u00a0is helping customers with any tech support problems\u00a0they may have in using the crimeware.<\/p>\n<p>In light of that, one innovation that Citadel brought to the table was to crowdsource some of this support work, easing the burden on the malware&#8217;s developers and freeing them up to spend more time improving their creations and adding new features.<\/p>\n<div id=\"attachment_13790\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-13790\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/02\/citadelav-600x735.png\" alt=\"Citadel users discuss the merits of including a module to remove other parasites from host PCs.\" width=\"600\" height=\"735\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/02\/citadelav-285x349.png 285w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/02\/citadelav-600x735.png 600w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/02\/citadelav.png 707w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">Citadel users discuss the merits of including a module to remove other parasites from host PCs.<\/p>\n<\/div>\n<p>Citadel boasted <a href=\"https:\/\/krebsonsecurity.com\/2012\/01\/citadel-trojan-touts-trouble-ticket-system\/\" target=\"_blank\">an online tech support system<\/a> for customers designed to let them file bug reports, suggest and vote on new features in upcoming malware versions, and track trouble tickets that could be worked on by the malware developers and fellow Citadel users alike. Citadel customers also could use the system to chat and compare notes with fellow users of the malware.<\/p>\n<p>It was this very interactive nature of Citadel&#8217;s support infrastructure that FBI agents would ultimately use to locate and identify Vartanyan, who went by the nickname &#8220;<strong>Kolypto<\/strong>.&#8221; The nickname of the core seller of Citadel was &#8220;<strong>Aquabox<\/strong>,&#8221; and the FBI was keen to identify Aquabox and any programmers he&#8217;d hired to help develop Citadel.<\/p>\n<p>In June 2012, FBI agents bought several licenses of Citadel from Aquabox, and soon the agents were suggesting tweaks to the malware that they could use to their advantage. Posing as an active user of the malware, FBI agents informed the Citadel developers that\u00a0that they&#8217;d discovered a security vulnerability in the Web-based interface that Citadel customers used to keep track of and collect passwords from infected systems (see screenshot below).<\/p>\n<p><div id=\"attachment_13489\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-13489\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/citadelpanel-600x478.png\" alt=\"A screenshot of the Citadel botnet panel.\" width=\"580\" height=\"462\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/citadelpanel-600x478.png 600w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/citadelpanel.png 679w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">A screenshot of the Web-based Citadel botnet control panel.<\/p>\n<\/div>\n<p> <span id=\"more-40087\"><\/span><\/p>\n<p>Aquabox took the bait, and asked the FBI agents to upload a screen shot of the bug they&#8217;d found. As noted in <a href=\"https:\/\/krebsonsecurity.com\/2015\/09\/arrests-tied-to-citadel-dridex-malware\/\" target=\"_blank\">this September 2015 story<\/a>, the FBI agents uploaded the image to file-sharing giant <strong>Sendspace.com\u00a0<\/strong>and then subpoenaed the logs from Sendspace to learn the Internet address of the user that later viewed and downloaded the file.<\/p>\n<p>The IP address came back as the same one they had previously tied to Aquabox. The other address that accessed the file was\u00a0in Ukraine and tied to Vartanyan. Prosecutors said Vartanyan&#8217;s address soon after was seen uploading to Sendspace a patched version of Citadel that supposedly fixed the vulnerability identified by the agents posing as Citadel users.<\/p>\n<div id=\"attachment_40102\" style=\"width: 219px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-40102\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/vt-thumbs.png\" alt=\"Mark Vartanyan. Source: Twitter.\" width=\"209\" height=\"259\" \/><\/p>\n<p class=\"wp-caption-text\">Mark Vartanyan. Source: Twitter.<\/p>\n<\/div>\n<p>&#8220;In the period August 2012 to January 2013, there were in total 48 files uploaded from Marks IP to Sendspace,&#8221; reads a story in the Norwegian daily VG that KrebsOnSecurity had translated into English <a href=\"http:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/09\/Mark-Citadel-VG.pdf\" target=\"_blank\">here<\/a> (PDF). &#8220;Those files were downloaded by &#8216;Aquabox&#8217; with 2 IPs (193.105.134.50 and 149.154.155.81).&#8221;<\/p>\n<p>Investigators would learn that Vartanyan was a Russian citizen who&#8217;d grown up in\u00a0Ukraine. At the time of his arrest, Mark was living in Norway, which later extradited him to the United States for prosecution. In March 2017, Vartanyan pleaded guilty to one count of computer fraud, and <a href=\"https:\/\/www.justice.gov\/usao-ndga\/pr\/russian-citizen-who-helped-develop-citadel-malware-toolkit-sentenced-0\" target=\"_blank\">was sentenced on July 19<\/a> to five years in federal prison.<\/p>\n<p>Another Citadel developer, <a href=\"https:\/\/www.justice.gov\/usao-ndga\/victim-witness-assistance\/information-victims-large-cases\/united-states-v-dimitry-belorossov-aka-rainerfox\" target=\"_blank\">Dimitry Belorossov (a.k.a. &#8220;Rainerfox&#8221;)<\/a>, was arrested and <a href=\"https:\/\/www.justice.gov\/usao-ndga\/pr\/russian-developer-notorious-citadel-malware-sentenced-prison\" target=\"_blank\">sentenced<\/a>\u00a0in 2015 to four years and six months in prison after pleading guilty to distributing Citadel. <\/p>\n<p>Early in its heydey, some text strings were added to the Citadel Trojan which named Yours Truly as the real author of Citadel (see screenshot below). While I obviously had no involvement in writing the trojan, I <em>have<\/em> written a\u00a0great deal about its core victims &#8212; mainly <a href=\"https:\/\/krebsonsecurity.com\/category\/smallbizvictims\/\" target=\"_blank\">dozens of small businesses here in the United States<\/a> who saw their bank accounts drained of hundreds of thousands or <a href=\"https:\/\/krebsonsecurity.com\/2015\/03\/hospital-sues-bank-of-america-over-million-dollar-cyberheist\/\" target=\"_blank\">millions of dollars<\/a> after a Citadel infection.<\/p>\n<div id=\"attachment_20619\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-20619\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/05\/citadelkrebs2-copy-600x35.png\" alt=\"A text string inside of the Citadel trojan. Source: AhnLab\" width=\"600\" height=\"35\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/05\/citadelkrebs2-copy-600x35.png 600w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/05\/citadelkrebs2-copy.png 725w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">A text string inside of the Citadel trojan. Source: AhnLab<\/p>\n<\/div>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/07\/how-a-citadel-trojan-developer-got-busted\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/02\/citadelav-600x735.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 25 Jul 2017 16:11:38 +0000<\/strong><\/p>\n<p>A U.S. District Court judge in Atlanta last week handed a five year prison sentence to Mark Vartanyan, a Russian hacker who helped develop and sell the once infamous and widespread Citadel banking trojan. This fact has been reported by countless media outlets, but far less well known is the fascinating backstory about how Vartanyan got caught.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[13156,13140,13157,6627,13158,13159,10644,13160],"class_list":["post-8449","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-aquabox","tag-citadel","tag-citadel-trojan","tag-fbi","tag-kolypto","tag-mark-vartanyan","tag-other","tag-small-business-victims"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8449"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8449\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}