Uses of a Trojan horse
When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.
When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.
https://searchsecurity.techtarget.com/definition/Trojan-horse
No comments:
Post a Comment