Trojan-Tuesday we will be discussing about one malware in
particular i.e. "TROJAN HORSE". Actually there is a story behind how
this malware got its name. The incident took place way back in the history when
the Greeks were trying to invade the city of Troy.
The people living in the city of Troy were known as Trojans. During
the war between the Greeks and the Trojans, Greeks surrendered and gave a huge
wooden horse as a memento to the Trojans. The Greeks sailed back and the Trojans
took the wooden horse into their city as a symbol of victory. The master plan
behind the wooden horse was that the Greeks filled the wooden horse with few
number of their soldiers before the Trojans took it into their city. Now when
the dawn came the soldiers creped out of the wooden horse and secured the path
for rest of the troop to get inside the city to launch the attack. Eventually Greeks
invaded the city of Troy.
Now in cyber security Trojan horse works in a similar way .It is
coded in such a way it attracts the user and compels the user to execute it in
the system. Once the Trojan horse gets executed, first thing it does is that it
creates a backdoor through which that attacker can get a remote access to the
host system. The purpose of a Trojan horse are Data destruction, Data theft, to
the a particular resource as well as identity, Passive spying, Stealing of
money.
Below mentioned are examples of Trojan horse:-
- Ø FinFisher – used by Lench IT solutions / Gamma International
- Ø DaVinci / Galileo RCS – used by HT S.r.l. (hacking team)
- Ø 0zapftis / r2d2 StaatsTrojaner – used by DigiTask
- Ø TAO QUANTUM/FOXACID – used by NSA
- Ø Magic Lantern – used by FBI
- Ø WARRIOR PRIDE – used by GCHQ.
To show
support for LogOut Gujarat’s 1st Cyber Awareness Conference Visit http://comexpocybersecurity.com/support to show your
support for privacy and security by changing your Facebook Profile
picture. #logout #staysafe
#stayprotected
if you think you have doubt about your spouse i say you contact cryptocyberhacker@gmail.com, whatsapp: +15188160274. he helped me hack my husband's phone and I caught him hooking up with other women, the evidence came in very handy in the divorce. you can mention that hannah jackson referred you for a quick response and you might probably get a discount.
ReplyDeleteTrojan Tuesday >>>>> Download Now
Delete>>>>> Download Full
Trojan Tuesday >>>>> Download LINK
>>>>> Download Now
Trojan Tuesday >>>>> Download Full
>>>>> Download LINK 3P
Hello friends, I’m from London and I’m using this medium to testify to the genuine work of an Hack Pro and PIA.When it comes to hacking although, I never believed it could be possible for me to access someone device without touching it but after contacting the hack pro (Larrywizardhacking57@gmail.com), now I know better.They hack all social media platforms, smartphones, bank Accounts, help recover stolen crypto and even more.
ReplyDeleteQuite amazing.You can also contact him via WhatsApp
Text:+1(2135297780).