Threat Database Trojans Trojan.Injector.PG

Trojan.Injector.PG

By GoldSparrow in Trojans

The Trojan.Injector.PG is a typical Trojan that utilizes code injection to hide its activities and hinder automated cyber security mechanisms. The threat presented by Trojan.Injector.PG can be compared to other code injectors like Trojan.Comet.A, Win-Trojan/Injector.6144.C and Trojan.Injector.BZ. The Injector.PG Trojan may be deployed via malvertising and spam campaigns and connect to a remote server to download instructions sent by its operators. The Trojan.Injector.PG cyber threat is known to inject its core process into a separate thread under a Windows process named ctfmon.exe that handles the Alternative User Input and Office Language Bar. The Trojan.Injector.PG malware may record the user's input via pen tablet, keyboard, voice and onscreen keyboard for Asian languages. Trojan.Injector.PG works as a keylogger that has extended capabilities and may make screenshots of your desktop.

The Trojan.Injector.PG malware may create HTML, TXT and INI files to log the activities of infected users and sent the collected data as an HTTP request to its 'Command and Control' servers. The Trojan.Injector.PG malware does not encrypt its connections, and network administrators may notice its traffic. The majority of samples of Trojan.Injector.PG collected by malware researchers suggest that it may not slow down your computer, but it may crash your browser and prevent pages from displaying properly. The Injector.PG Trojan may place its files in the Temp folder of Windows to evade security scans. The Trojan.Injector.PG malware may write a registry entry in Windows to run every time you log on. Computer users can protect their Windows OS and credentials by installing a credible anti-malware suite.

Trending

Most Viewed

Loading...