Home Malware Programs Trojans Trojan.Cossta

Trojan.Cossta

Posted: February 9, 2016

The Cossta family of Trojans contains several branches that cover keyboard manipulation, screen grabbing and the deployment of other threats. Most Trojans in the Cossta family are dedicated to recording your keystrokes and sending the collected data to its Command and Control servers. Cyber hackers that use Trojans from the Cossta family may be after your banking details, social media log-ins, and, in rare cases, - your academic credentials. The typical Cossta Trojan is spread among users via traditional deployment techniques such as spam mail and freeware on shady software distribution platforms. However, there are examples where the Cossta Trojan is used in combination with the HanJuan Exploit Kit and infiltrates systems successfully, due to a software vulnerability. The Trojans from the Cossta family are installed in the Temp folder under the Windows directory to evade early detection and will load after the restart as a background service. There are some Cossta Trojans that may change your DNS and proxy settings to reroute your Internet traffic via servers operated by third parties. Needless to say, unencrypted data being sent from machines infected with Cossta could be altered and corrupted. PC users should keep in mind that the Cossta Trojans may be used to introduce ransomware like Los Pollos Hermanos and TorrentLocker into your computer and lock your files. Given the main field of operations of the Cossta Trojans, you might want to protect your data and user credentials by installing reputable anti-malware shield.

Related Posts

Loading...