Trojans

  • Agent Tesla
    A sophisticated trojan that often spreads through phishing emails. It can steal credentials, capture keystrokes, and exfiltrate sensitive data.
  • Remcos
    Remcos infiltrates systems through malicious email attachments, enabling remote control over the infected device, and can steal data, record keystrokes, and activate the webcam.
  • njRAT
    A remote access trojan that allows attackers to control infected machines, steal credentials, and access personal files. It's often distributed through phishing emails.

All Posts

Trojans

A type of malicious software that disguises itself as a legitimate program or file to trick users into downloading and installing it on their devices. Unlike viruses and worms, Trojans do not replicate themselves, but they can be just as damaging because they often provide a backdoor for other malicious activities.

It seems we can’t find what you’re looking for. Perhaps searching can help.

Scroll to Top