Shark 2 dumbs down Trojan horse creation

Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware. Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things. The tool is being distributed […]

Share online:

Malign coders have created a new version of a tool that dumbs down the process of creating Trojan horse malware.

Shark 2 can be used to create Trojans capable of stealing confidential data, or backdoor programs that can be used to surreptitiously capture images from infected PCs, among other things.

The tool is being distributed via several underground internet forums. Software development is almost equivalent to that available from legitimate software vendors with regular updates to the code bringing the latest detected version up to version 2.3.2.

Full Article

Malwares, Trojan Horse, Trojan, Shark 2, Tools

About The Author

Deepak Gupta is a IT & Web Consultant. He is the founder and CEO of diTii.com & DIT Technologies, where he’s engaged in providing Technology Consultancy, Design and Development of Desktop, Web and Mobile applications using various tools and softwares. Sign-up for the Email for daily updates. Google+ Profile.