Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » H »

Hand of Thief Trojan

Trojan malware developed to enable cyber criminals to compromise Linux systems and steal user information from the systems. The Hand of Thief Trojan (HoT Trojan) is one of the first strains of malware to specifically target desktop Linux systems, and it’s claimed that the HoT Trojan can currently compromise at least fifteen different variants of Linux.

The Hand of Thief Trojan is considered a work in progress, lacking some of the key features to be an effective attack tool, but it’s still being sold for $2,000 by its Russian-based developer. And while the code isn’t yet complete at this time, the Hand of Thief Trojan could eventually have full malware capabilities, including the ability to inject content into banking websites as well as better exfiltration and filtering features.







TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
Who's Moving Ahead in Cloud Computing?

The future remains, well, cloudy. But either way: Amazon, look out. Microsoft is gaining fast. Read More »

Hype Versus Action in the Developer's World

Often times technologies start as hype but with time become adopted. As a developer or technologist, it is worth reading the hype and knowing the... Read More »

Microsoft Hyper-V Network Virtualization Q&A

The top 5 Hyper-V questions with answers provided by Nirmal Sharma, a MCSEx3, MCITP and Microsoft MVP in Directory Services. Read More »

QUICK REFERENCE
How to Create a Desktop Shortcut to a Website

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Read More »

Flash Data Storage Vendor Trends

Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »

15 Important Big Data Facts for IT Professionals

Keeping track of big data trends, research and statistics gives IT professionals  a solid foundation to plan big data projects. Here are 15... Read More »