Trojan is malicious software, which differs from a virus in its propagation method. Most often, it penetrates the system under the guise of an ordinary, legitimate program, which explains its name. After penetration, it can do a lot of things: it can collect information about the device and its owner, steal data stored on a computer, block access to user information, disable the operating system, deactivate security systems, and mine cryptocurrency.
In the Cyber Security Report 2020, experts from Check Point Software described the main tools that cybercriminals used to attack companies around the world in 2019. This became known on January 21, 2020.
According to experts, cryptominers dominate malware despite the fact that the number of crypto mining attacks has declined in 2019. 38% of companies worldwide have fallen victim to this malware. The popularity of cryptominers is ensured by low risks and high income. According to the survey, only 7% of Russian companies were afraid of cryptominers.
Only EDR systems can deal effectively with this type of threat.
The «ZeroTrust» security model counteracts hackers using trojan.
of companies around the world have become victims of cryptominer’s infections via using Trojan malware
Keeper ZT fully protects the endpoint against Trojan-type threats by:
- Having total control over script execution
- Blocking the execution of the CMD and Powershell
- Controlling software integrity
- Blocking the installation of plugins, add-ons, extensions
- Controlling the installation of third-party software by the user on the endpoint