About Trojans attacks


Trojans
Trojans are nothing but remote administration tool (RATs) the providing attackers with remote control and remote access to the victim system other words, once a system has been infected with a Trojan, an attacker can remotely control almost all hardware and software on it . Modern day Trojans have become extremely advanced, and provide attackers with a variety different sophisticated feature for remote control. Once a Trojan has been installed on a system, then not only is all its data under threat, but also there is a high possibility wherein the compromised system may be misused to initiate an attack on some third-party system.
Trojans are clearly extremely dangerous tools that are capable of doing a lot of harm to the victim system. Some of the most common malicious activities that can be conducted with the help of Trojans are as follows:


1.       Trojans are most commonly used by attackers to steal sensitive IP data from the victim corporation and by pranksters to play pranks on unsuspecting individuals. Once a Trojan is installed on a system, the attackers can access, delete, upload or download files from it. IP theft is not only very expensive, but can also very quickly tarnish the reputation of a corporation. Using a Trojan, an attacker can also gain access to all hardware and software on it, hence, opening up the target system to a variety of different pranks. Some of the most common pranks that can be played using Trojans are:

·         if you are listening to music, an attacker can increase or decrease the volume.
·         If you are trying to move your mouse towards left, an attacker can move it towards right.
·         If you are trying to type XYZ…, an attacker can type ABC.
·         An attacker can open and close your CD tray on a regular basis.

Trojans attack found!

2.       A number of Trojans have inbuilt logging capabilities. Recently, there has been an explosion in the number of Trojans that can also double up as key-loggers and record all keystrokes made by the victim in the infected system. In other words, key-loggers are nothing but loggers that recorded all keys (in a predefined log file) that were pressed on the victim system. Such Trojans are perfect for:

·         Stealing the contents of sensitive emails and documents.
·         Recording password, credit card numbers, account Ids, etc.
·         Stealing software programming code.
·         Finding out what price your competition is planning to quote for a particular project.



Trojans attack found!

No comments:

Post a Comment