Monday, April 29, 2019

Trojan horse (computing)

Uses of a Trojan horse

When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:

Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.

https://searchsecurity.techtarget.com/definition/Trojan-horse

No comments: