10-2 Flashcards
a malware that targets android device discovered i 2015. it will repackage legit android applications to insclude adware with them
Shedun
another android trojan horse. discovered in 2015. it appears as an IQ Test application. it installs a rootkit on target system.
brain test
developed by a private company but sold only to law enforcement. it appears as a software update. ultimately installs on the target system as spyware. this entire suite of software was exposed by WikiLeaks in 2011
FinFisher
trojan similar to Back orfice. this is a _________worm that tries to infect target machines with the ______ tojan. operates only on port 20034. gives remote user complete control of infected system.
Netbus
discovered in 2011. an older trojan. affects MAC OS X. infection came from redirecting the user to a site that had an applet containing an exploit.
FlashBack
active from 2014 to 2016, but can still be found today. based on components of the older Zeus Trojan. it set up an encrypted peer-to-peer botnet allowing the perpetrator to control infested computers.
GameOver Zeus
placed on a linux ftp server between Jan22 1999 to Jan 24 1999 as_________________
until-linux-2.9g.tar.gz
an old tojan. is also a backdoor administrative tool. give remote user control over infected system.
Portal of Doom
Portal of doom will allow a hacker to do the following
open/close CDtray shutdown open files / programs access drives changepassword logging keystroke taking screenshots
symptoms of a trojan horse
change in homepage
change password, username, accounts, etc
change screensaver, mouse settings, backgrounds
any device that seems to work on its own
the best way to protectyourself against a trojan horse is a_______ approach using both technological measures and ________ measures
hybrid // policy
technological measures to prevent trojan horses
block unused ports
use antivirus software
prevent active code ion your browser
give users least privilege’s
policy measures to prevent trojan horses
no downloads unless u r certain of its origins
close unused ports
be cautious of hidden file extension