Section 6.49 Trojans Flashcards
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
Trojans
Piece of malicious software that is disguised as a piece of harmless or desirable software. Claims that it will perform some needed or desired function for you.
Trojans are commonly used today by attackers to exploit a vulnerability in your workstation and then conducting data exfiltration to steal your sensitive documents, creating backdoors to maintain persistence on your systems, and other malicious activities
Remote Access Trojan (RAT)
Widely used by modern attackers because it provides the attacker with remote control of a victim machine
Tetris: Attacker passed out floppy disk of Tetris (the game) but it was an infected version which allowed the attacker to take control of the system