Use of Malware in Espionage

Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to explo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Medical Imaging and Information Sciences 2010, Vol.27(4), pp.102-104
1. Verfasser: HONJO, Shinsuke
Format: Artikel
Sprache:eng ; jpn
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage.
ISSN:0910-1543
1880-4977
DOI:10.11318/mii.27.102