Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » H »

Hand of Thief Trojan

Trojan malware developed to enable cyber criminals to compromise Linux systems and steal user information from the systems. The Hand of Thief Trojan (HoT Trojan) is one of the first strains of malware to specifically target desktop Linux systems, and it’s claimed that the HoT Trojan can currently compromise at least fifteen different variants of Linux.

The Hand of Thief Trojan is considered a work in progress, lacking some of the key features to be an effective attack tool, but it’s still being sold for $2,000 by its Russian-based developer. And while the code isn’t yet complete at this time, the Hand of Thief Trojan could eventually have full malware capabilities, including the ability to inject content into banking websites as well as better exfiltration and filtering features.







TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
13 Best Free Android Apps

From secure messaging to document editing, our top free must-have apps have been rated, reviewed and named the best free Android apps of 2015. Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the current devices that we use today. Read More »

Cloud Computing Market Leaders, 2015

If not for AWS, Microsoft would dominate the cloud. The race to capture market share will grow ever more fierce in the years ahead. Here's a look... Read More »

QUICK REFERENCE
29 Free Android Apps for Cash-Strapped Students

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »

Network Fundamentals Study Guide

A network is a group of two or more computer systems or devices, linked together to share resources, exchange files and electronic communications.... Read More »

Computer Architecture Study Guide

This Webopedia  study guide describes the different parts of a computer system and their relations. Read More »