Wednesday, August 3, 2011

Trojan Methods for Subverting Desktops

The notorious recent corruption of RSA systems defenses was accomplished by using the the Poison Ivy remote administration utility. It is a backdoor Trojan. It bypasses normal security mechanisms to secretly control a program, computer or network. It is available from   .

There are other similar programs commercially available. There is an illegal market that offers backdoor Trojans that are hard to trace, or can be available as a zero-day event. That makes the Trojan undetectable for all practical purposes.

The notorious Anonymous organization uses the readily available RemotelyAnywhere software. If a computer is already occupied by a bot, the installation of RemotelyAnywhere can proceed without a user knowing about that. It is available from .

No comments:

Post a Comment

For comments please e-mail paul@strassmann.com