What is a Trojan horse?

//

Keith Rainz

Learn What a Trojan horse is. A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc.

The list below shows some of the activities that the attacker can perform using a Trojan horse.

Use the user’s computer as part of the Botnet when performing distributed denial of service attacks.
Damage the user’s computer (crashing, blue screen of death, etc.)
Stealing sensitive data such as stored passwords, credit card information, etc.
Modifying files on the user’s computer
Electronic money theft by performing unauthorized money transfer transactions
Log all the keys that a user presses on the keyboard and sending the data to the attacker. This method is used to harvest user ids, passwords, and other sensitive data.
Viewing the users screenshot
Downloading browsing history data.

READ ALSO  Should I use JSON or XML for my API?

Leave a Comment

 

Keith Rainz

Contact me

Along Kafue Road, Chilanga, Lusaka Zambia.

Contact me

Connect with me

Review Your Cart
0
Add Coupon Code
Subtotal