{"id":2435,"date":"2013-02-16T00:00:00","date_gmt":"2013-02-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/16\/citadel-trojan-moves-beyond-banks\/"},"modified":"2021-12-30T11:41:20","modified_gmt":"2021-12-30T11:41:20","slug":"citadel-trojan-moves-beyond-banks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/16\/citadel-trojan-moves-beyond-banks\/","title":{"rendered":"Citadel Trojan Moves Beyond Banks"},"content":{"rendered":"<p>Despite its commercial removal from underground forums last year, the highly sophisticated Trojan known as Citadel is now a global threat to multiple business sectors, not just financial services, according to researchers at McAfee Labs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This latest version of Citadel, an advanced Zeus variant originally designed to steal online banking credentials, is now being used to steal intellectual property. And everything from government agencies and healthcare organizations to manufacturing companies, the oil and gas industry, and educational institutions is being targeted, researchers warn.<\/span><\/p>\n<p><span style=\"font-size: 100.01%; line-height: 1.45em; \">Link: <\/span>http:\/\/www.bankinfosecurity.com\/citadel-trojan-moves-beyond-banks-a-5514<\/p>\n<p style=\"font-size: 100.01%; padding-top: 3px; padding-bottom: 24px; padding-left: 16px; clear: right; float: right; width: 220px; \">\n<h3 style=\"font-size: 0.85em; padding-bottom: 2px; font-weight: normal; line-height: 1.15em; font-family: Arial, Helvetica, sans-serif; color: rgb(51, 51, 51); text-transform: uppercase; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: rgb(85, 85, 85); \"><\/h3>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2435","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2435"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2435\/revisions"}],"predecessor-version":[{"id":4922,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2435\/revisions\/4922"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}