[go: nahoru, domu]

Targeted threat: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: title. | Use this bot. Report bugs. | Suggested by BrownHairedGirl | #UCB_webform 2078/3840
change link
Line 13:
 
==Examples==
* In one instance, [[Trojan horse (computing)|Trojan horses]] were used as a targeted threat so that Israeli companies could conduct [[corporate espionage]] on each other.<ref>Williams, Dan. "Israel holds couple in corporate espionage case." "http://www.computerworld.com/securitytopics/security/virus/story/0,10801,108225,00.html?from=story_kc, Jan. 31, 2006</ref>
* The Hotword Trojan, the Ginwui and the PPDropper Trojans are additional examples of Trojans used for corporate espionage.<ref>Symantec Corp., Symantec Internet Security Threat Report, Vol X, Sep. 2006, p. 4.</ref>
* Targeted destination attacks use harvested IP addresses to send messages directly to recipients without an MX record lookup. It aims for specific sites and users by defeating hosted protection services and internal gateways to deliver e-mail with malicious payloads.<ref>Avinti, Inc. "Targeted Destination Attacks." Sep. 2005. {{cite web |url=http://www.avinti.com/download/labs/targeted_destination.pdf |title=Archived copy |accessdate=2006-11-28 |url-status=dead |archiveurl=https://web.archive.org/web/20120215102852/http://www.avinti.com/download/labs/targeted_destination.pdf |archivedate=2012-02-15 }}</ref>