Infection Techniques
- Freeware Software & Games Freeware software & Games downloaded from the untrusted websites are bind with Trojans , which on installing them automatically gets executed in the background . Hence this is one of the easiest way to deploy the Trojan into any system.
- Attachment
Attachments in the emails or from various medium contains Trojans bind with them . When the target open the file, Trojan automatically get executed in the background - Instant messaging and social media
Trojans might be spread over the instant messaging and social media. From the study , it is concluded that attacker send some malicious content or links to the target over IM’s and social media which in turn contains Trojans - Browser & Extensions
web browser and its extension are sometimes infected with Trojans . There are many extension available which anonymously install the trojans into the system - Untrusted Websites
Trojans may get transmitted from the untrusted websites - File Sharing and Physical access
Physical access to the system or during file sharing attacker can transfer the Trojans into the target system . Trojans automatically execute itself without being detected
1 Comment