-erasing or overwriting data on a computer
-corrupting files in a subtle way
-spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'.
-setting up networks of zombie computers in order to launch DDoS attacks or send spam.
-spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
-phish for bank or other account details, which can be used for criminal activities.
installing a backdoor on a computer system.
找别人翻译,基本上是7种:
1)改电脑系统的资料
2)以巧妙方式破坏系统文件(让重要文件被改后,电脑不至于完全不动,不然他中木马给你也没用)
3)透过您电脑散播其它病毒
4)让被攻击者的电脑被控制(僵尸),行成一个网路,被利用来发垃圾邮件,(僵尸网路也可以被骇客用来ping死看不顺眼的网站)
5)当成"间谍",窃取私人资料,如上网时去哪里,作什么(公司主管应该会用...)
6)窃取银行帐号和资料
7)在电脑开一个后门,让骇客方便进入 |