China’s TROJAN HORSE:
In computing, a Trojan horse,[1] or trojan,[2] is
any malware which
misleads users of its true intent. The term is derived from the Ancient Greek story
of the deceptive Trojan Horse that led to the fall of the
city of Troy.[1][2][3][4][5]
Trojans
are generally spread by some form of social engineering, for example where a
user is duped into executing an email attachment
disguised to appear not suspicious, (e.g., a routine form to be filled in), or
by clicking on some fake advertisement on social media or anywhere else.
Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can
then have unauthorized access to the affected computer.[6] Trojans
may allow an attacker to access users' personal
information such as banking information, passwords, or personal
identity. It can also delete a user's files or infect other devices connected
to the network. Ransomware attacks are often carried out using a trojan.
Unlike computer viruses, worms,
and rogue security software, trojans generally
do not attempt to inject themselves into other files or otherwise propagate
themselves.[7]
https://youtu.be/VhscBtuL0-Q?t=275
No comments:
Post a Comment