202121 Sep



This particular malware threat is extremely versatile and can be programmed to perform a wide range of intrusive and harmful activities on the infected systems. The exact behavior of the Trojan is largely dependant on the specific goals of the threat actors and the nature of their harmful operation. In the typical case, Trojans are tasked with establishing espionage routines on the compromised device. They might act as keyloggers grabbing every pressed key or mouse click, taking arbitrary screenshots of the system, or if the system has a camera or microphone, the attackers could even force the devices to record video or audio. Through this hidden channel, the threat actors can further escalate the attack by downloading additional threatening payloads to the system.

Source: Enigmasoftware