Icoscript

By CagedTech in Remote Administration Tools

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 92
First Seen: October 31, 2014
Last Seen: December 8, 2022
OS(es) Affected: Windows

Malware researchers have uncovered a very smart cyber-hacking technique that consists in the use of e-mail drafts as the Command and Control communication channel between hackers and the targeted computer. The hackers initiate the attack creating an unidentified Gmail account through which they may infect the aimed computer with a Trojan named Icoscript. After Icoscript installation, they will have the machine's control. From there on, the hackers will be able to perform innumerable actions, all against the computer user. Their commands will be concealed in modest Gmail drafts that may remain undetected until the computer users, noticing the unusual behavior presented by their machines, execute a deep scan on their computers and detect the presence of the Icoscript Trojan infection. It is crucial to exterminate Icoscript upon its detection. Removal of such Trojan infections demands a genuine and up-to-date anti-malware product that is skilled to deal with newly discovered techniques.

Trending

Most Viewed

Loading...