Threat Database Trojans Troj/Agent-TZG

Troj/Agent-TZG

By ESGI Advisor in Trojans

Threat Scorecard

Ranking: 16,352
Threat Level: 50 % (Medium)
Infected Computers: 34
First Seen: November 29, 2011
Last Seen: August 27, 2023
OS(es) Affected: Windows

The Intuit Supplies Group is a legitimate company that had its online reputation tarnished by a malicious Trojan, which is part of an ongoing phishing scam. Victims of this Trojan, which may be identified as Troj/Agent-TZG, will receive a message claiming to come from Intuit, a company specialized in payroll software. The email's subject is "Your Intuit Online Payroll Free Trial" and it will invariably contain a compressed attachment which is really the Troj/Agent-TZG Trojan in disguise. ESG security researchers strongly warn against opening any unsolicited email attachments, regardless of their supposed origin. One of the most common online scams, the phishing, involves creating emails that appear to come from legitimate companies, in order to convince their victim to download an attached file. These attachments will usually end up being dangerous malware infections, such as the Troj/Agent-TZG Trojan. Other ways in which similar malware can be distributed is through links embedded in these kinds of fake emails. Because emails containing the Troj/Agent-TZG Trojan can be highly authentic-looking, ESG security researchers strongly recommend avoiding all contact with unsolicited email attachments. Legitimate companies understand that most computer users versed in basic computer security will never open an unsolicited email attachment or embedded link, and have adapted their advertising and newsletters to accommodate this fact. Because of this, you can refrain from opening these kinds of attachments without fear of missing out on any legitimate offer or deal.
 

Effects of the Troj/Agent-TZG Trojan

The Troj/Agent-TZG Trojan appears to be a dangerous malware infection that is designed to allow a remote party to gain access to your computer system. These kinds of malware infections are named after the Trojan Horse because, much like this legendary horse from the Iliad, they require their victim to open the doors and let them in. In other words, unlike viruses, Trojans require the victim to install them or download them onto their computer system. This is why criminals use deceptive emails like the one mentioned above to deliver Troj/Agent-TZG. Once inside the victim's computer system, the Troj/Agent-TZG Trojan can open up a backdoor into the infected computer system, a hole in the computer's defenses that a criminal can exploit, in order to gain access to the operating system. Using this backdoor, a criminal can control an infected computer from far away, removing, copying and overwriting data, spying on the computer's activities and using it to carry out all kinds of criminal enterprises.

Trending

Most Viewed

Loading...