Friday, March 21, 2014

The 15 important uses of trojan


A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker, or be caused unintentionally by program operation, on a targeted computer system include:

  • Utilization of the machine as a major aspect of a botnet (e.g. to perform computerized spamming or to appropriate Denial-of-administration assaults)
  • Electronic cash burglary
  • Information burglary, including classified documents, at times for modern reconnaissance, and data with budgetary suggestions, for example, passwords and installment card data
  • Change or erasure of documents
  • Downloading or transferring of documents for different purposes
  • Downloading and introducing programming, including outsider malware and ransomware
  • Keystroke logging
  • Viewing the client's screen
  • Seeing the client's webcam
  • Controlling the machine framework remotely
  • Scrambling records; a payoff installment may be requested for decoding, as with the Cryptolocker ransomware
  • Alterations of registry
  • Utilizing machine assets for mining cryptocurrency
  • Connecting PC to Botnet
  • Utilizing tainted PC as substitute for unlawful exercises and strike on different machines.
  • More inclined to be unintended or simply vindictive, as opposed to criminal, results:
  • Smashing the PC, e.g. with "blue screen of death" (BSOD)
  • Information debasement
  • Arranging circles, pulverizing all substance
  • Taints whole Network managing an account data and other joined gadgets

0 comments:

Post a Comment

 
Copyright © 2012. Trojans Horses - Posts · Comments
Theme Template by BTDesigner · Powered by Blogger