Phishing: Difference between revisions
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
===Torpig-family Trojan=== | ===Torpig-family Trojan=== | ||
These Trojans are using advanced technologies that help them to spread very fast and hide very well. They are designed to hijack sessions. These Trojans are constantly monitoring major banks’ websites throughout the world. They display a fake page when a user tries to log in to these websites, and in this way continue to steal the private information of their victims. | |||
===Session Hijackers=== | ===Session Hijackers=== | ||
===Content-Injection Phishing=== | ===Content-Injection Phishing=== |
Revision as of 11:59, 31 July 2008
Study Guide
Background
Phishing Attacks
Keyloggers
These are spywares that can get installed either into a web browser or as a device driver. They record the user’s input to the computer by recording the keyboard keystrokes or mouse click. This information will be then sent to the spyware owner. These spywares can cause severe data leak.
Torpig-family Trojan
These Trojans are using advanced technologies that help them to spread very fast and hide very well. They are designed to hijack sessions. These Trojans are constantly monitoring major banks’ websites throughout the world. They display a fake page when a user tries to log in to these websites, and in this way continue to steal the private information of their victims.