Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.
Backdoors are designed to give malicious users remote control over an infected computer. In terms of functionality, Backdoors are similar to many administration systems designed and distributed by software developers. These types of malicious programs make it possible to do anything the author wants on the infected computer: send and receive files, launch files or delete them, display messages, delete data, reboot the computer, etc. The programs in this category are often used in order to unite a group of victim computers and form a botnet or zombie network. This gives malicious users centralized control over an army of infected computers which can then be used for criminal purposes. There is also a group of Backdoors which are capable of spreading via networks and infecting other computers as Net-Worms do. The difference is that such Backdoors do not spread automatically (as Net-Worms do), but only upon a special “command” from the malicious user that controls them.Java
Java is a platform for developing and running programs written in the Java programming language.Adwind
A cross-platform multifunctional backdoor written in Java that can run on Windows, macOS, Linux, and Android. First discovered in 2013, this backdoor is sold on the darknet under the malware as a service (MaaS) model. Also known as AlienSpy, Frutas, Unrecom, Sockrat, JSocket, or jRat. The backdoor is most often distributed by email in the form of JAR attachments. Attackers use this malware to collect and extract system data, as well as remotely control the infected device. Currently the malware can: take screenshots, record keystrokes, steal passwords and data stored in browsers and web forms, take photos and videos using a webcam, make audio recordings using the built-in microphone, collect general information about the user and system, steal keys for cryptocurrency wallets as well as VPN certificates, and hijack SMS messaging.
Geographical distribution of attacks by the Backdoor.Java.Adwind family
Top 10 countries with most attacked users (% of total attacks)
* Percentage among all unique Kaspersky Lab users worldwide attacked by this malware