Mary Landesman

Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, installing other software, uninstalling software, or sending sensitive password and login information to a remote attacker. Regardless of how the infection gets on the system, once installed, the system is under the control of the attacker. Often, the attacker will share the list of zombied systems with others, giving unfettered access to their collection of zombie machines by other ill-intended criminals. Attackers can also often simply scan for compromised machines, which often send a greeting of readiness to listening ears. … Continue reading Mary Landesman