Trojan Horses
Remote access management consoles that enable users to access a computer and manage it from afar
More often concealed in another software that is downloaded over Internet
- Common carriers: Music and video files shared on Internet sites
Undetected by antivirus software
Major Trojans
- Back Office: attacked Windows servers
- Gives the attacker the same right as the administrator
- Morphed into tools such as MoSucker and Optix Pro