Android Spyware: A Trojan Horse Implementation
This project delves into the persistent threat of Trojan horses, emphasizing the heightened risk they pose due to their seemingly benign nature. This Trojan horse can discreetly harvest sensitive data from Android devices. It clandestinely collects device information such as, SMS messages, contacts, call logs, and installed apps, and transmits the pilfered data to a remote server through a covert background process. Remarkably, the Trojan horse offers remote control capabilities, allowing a command-and-control center to manipulate it and launch (Distributed) Denial-of-Service attacks on specified IP addresses. Additionally, the Trojan horse showcases its efficacy as a cyber espionage tool by successfully infiltrating Gmail and Facebook accounts. Try it Out!
Keywords: Android, Trojan horse, spyware