Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Zeus malware targeting Citrix Access Gateway

November 16 2010

Versions of the infamous Zeus malware have begun harvesting login credentials for network appliances, according to researchers. Security firm Trusteer is reporting the discovery of new code within certain Zeus configuration files that attempts to collect data from Citrix VPN tools.

The company said that the code appears to be specific to certain Zeus 2.0 installations and instructs an infected machine to capture and transmit a screenshot of all mouse clicks whenever the text "/citrix/" appears in the browser's address bar.

Researchers at Trusteer believe that the code is an attempt by a Zeus botnet operator to harvest account details from Citrix Access Gateway deployments by using screenshots to capture 'keystroke' images from virtual keyboards. The on-screen keyboards are typically used to thwart keylogging malware tools.

"This attack code clearly illustrates that Zeus is actively targeting enterprises and specifically remote access connections into secure networks," Trusteer said.

"Fraudsters are no longer satisfied with simply going after bank accounts. They are also targeting intellectual property and sensitive information contained in company IT networks and applications."

The Zeus malware has become increasingly popular amongst criminals for its ability to embed code directly into otherwise legitimate web pages.

Adding to the danger, the malware is easy to manage and older versions can be obtained for little to no cost.

Trusteer is recommending that administrators protect all VPN systems by limiting access to trusted applications and users as well as adopt best practices such as keeping updated software and security tools and educating users.

At the time of publishing Citrix had yet to return a request for comment on the report.

View more news

 
  Most Popular
 
 
  Popular Searches
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html