The purpose of these Trojans is to send data back to the hacker with information such as passwords (ICQ, IRC, FTP, HTTP) or confidential information such as credit card details, chat logs, address lists, etc.
The Trojan could look for specific information in particular locations or it could install a key-logger and simply send all recorded keystrokes to the hacker (who in turn can extract the passwords from that data).
An example of this is the Badtrans.B email virus (released in the wild in December 2001) that could log users' keystrokes.
Captured data can be sent back to the attacker's email address, which in most cases is located at some free web-based email provider.
Alternatively, captured data can be sent by connecting to a hacker's website - probably using a free web page provider - and submitting data via a web-form.
Both methods would go unnoticed and can be done from any machine on your network with Internet and email access.
Both internal and external hackers can use data-sending Trojans to gain access to confidential information about your company.
_________________________
Comments
Post a Comment