Shark 2 dumbs down Trojan horse creation

Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware. Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things. The tool is being distributed […]

Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware.

Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things.

The tool is being distributed via several underground internet forums. Software development is almost equivalent to that available from legitimate software vendors with regular updates to the code bringing the latest detected version up to version 2.3.2.

Full Article

Malwares, Trojan Horse, Trojan, Shark 2, Tools