The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration scenarios. Read our in-depth article about its capabilities and how to remove active infections.
Kedi Trojan – Distribution Methods
The Kedi Trojan is a new weapon used by computer criminals to infect users all around the world. At the moment the primary method of distribution is the use of phishing email messages. The captured samples indicate that the malicious users behind it attempt to confuse the recipients into believing that they have received a legitimate message from a well-known company. The goal is to deliver an infected payload to the users. They can be either attached directly or linked in the body contents.
In addition the payload files can also be uploaded to hacker-created sites. They are made by taking the web design elements of well-known portals or vendors and uploading the files to it.
There are two main types of malicious payloads that are being used to the Kedi Trojan:
- Infected Software Installers — The hackers can take the legitimate setup files of famous applications and modify them to include the Kedi Trojan code. In this particular case the attacks target a (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Martin Beltov. Read the original post at: https://sensorstechforum.com/kedi-trojan-removal-identify-delete-active-infections/