You are reading 0 threads
  • Author
    Messages
    • #25489
      Nicholas Coolman
      Key Master

      LMIA trojan that analyzes antivirus logs.

      Cybercriminals from the Turla gang have integrated original functionalities into a Trojan. This is able to retrieve antivirus logs to find out if it is detected and receive instructions from Gmail.
      Read more

      Un Trojan horse (Trojan Horse in English) is a type of malware, often confused with viruses or other parasites. The Trojan horse is software that appears legitimate, but contains malware. The role of the Trojan horse is to bring this parasite onto the computer and install it there without the user's knowledge. The contained program is called the "payload". It can be any type of parasite: virus, keylogger, spyware. It is this parasite, and it alone, which will execute actions within the victim computer. The Trojan horse is nothing other than the vehicle, the one that “brings the wolf into the fold”. This software is not harmful in itself because it does not perform any action other than allowing the installation of the real parasite. In their cyberattacks, hackers can use the trojan payload to install ransomware.

      Free support forum
      Nicholas Coolman

You are reading 0 threads
  • You must be logged in to reply to this topic.
Back to top