Trojan.Cossta
The Cossta family of Trojans contains several branches that cover keyboard manipulation, screen grabbing and the deployment of other threats. Most Trojans in the Cossta family are dedicated to recording your keystrokes and sending the collected data to its Command and Control servers. Cyber hackers that use Trojans from the Cossta family may be after your banking details, social media log-ins, and, in rare cases, - your academic credentials. The typical Cossta Trojan is spread among users via traditional deployment techniques such as spam mail and freeware on shady software distribution platforms. However, there are examples where the Cossta Trojan is used in combination with the HanJuan Exploit Kit and infiltrates systems successfully, due to a software vulnerability. The Trojans from the Cossta family are installed in the Temp folder under the Windows directory to evade early detection and will load after the restart as a background service. There are some Cossta Trojans that may change your DNS and proxy settings to reroute your Internet traffic via servers operated by third parties. Needless to say, unencrypted data being sent from machines infected with Cossta could be altered and corrupted. PC users should keep in mind that the Cossta Trojans may be used to introduce ransomware like Los Pollos Hermanos and TorrentLocker into your computer and lock your files. Given the main field of operations of the Cossta Trojans, you might want to protect your data and user credentials by installing reputable anti-malware shield.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.