App-Injected Trojans


 

Antivirus and firewalls have a difficult time stopping trojans after they’ve injected themselves into reputable programs. Consider Trojan T9000 as a perfect case in point:

Trojan T9000 transmitted Word documents, Excel spreadsheets, screenshots, and much more while remaining undetected by popular antivirus programs. How do Trojans like T9000 transmit sensitive info for months (even years) without being detected? To avoid detection during transmission, Trojan T9000:

  • Injected itself into a standard Window’s process called explorer.exe. Therefore, the antivirus programs believed explorer.exe was doing the transmitting.
  • Transmitted directly to an IP address of the hacker’s command and control center. Therefore, the trojan didn’t need to reveal any domain name.
  • Encrypted the data before transmitting it. Therefore, antivirus and firewalls couldn’t detect that screenshots, documents, etc. were being sent.

In order to test whether a product can stop trojans such as T9000, the testing lab needs to build trojans with the same characteristics. Fortunately, Core Security has designed the premiere platform for such security testing: Core Impact. Core Impact can cost security companies up to $50,000 per year; as it’s the premiere platform for testing the effectiveness of a company’s security methods — including testing effectiveness against app-injected trojans.

Terra Privacy’s lab licensed Core Impact for internal testing to ensure the effectiveness of Hacker Deterrent Pro prior to public release. Terra Privacy’s labs conducted a variety tests. One test included building multiple trojans with the same key characteristics as Trojan T9000. These Core Impact trojans:

  • Injected themselves into explorer.exe.
  • Transmitted directly to the IP addresses of the command and control centers.
  • Sent the data through encrypted tunnels.

In other words, Terra Privacy’s labs built trojans with the same sophisticated features as state-sponsored spyware. The following video shows how Hacker Deterrent Pro effortlessly exposes and blocks even this type of highly-sophisticated trojan.

In all tests, Hacker Deterrent Pro consistently stopped app-injecting trojans from communicating directly with the IP addresses and domains of hacker command and control centers.

Unique Protection

Click on any hacking attack below to see how Hacker Deterrent Pro protects you in ways that antivirus and firewalls do not:


Hacker’s Dirty Little Secret

The cybersecurity industry has a dirty little secret that hackers don’t want you to know. What’s the secret? Find out here.

Note: The patented and patent-pending technologies of Hacker Deterrent Pro were created by world-renowned cryptographer Michael Wood.