Trojans can scoop directory structures maliciously

A mounted Truecrypt container is analogous to an unencrypted file. Truecrypt provides to mount files and volumes on arbitrary drive letters. Windows uses alphabet letters; Unix uses numeric digits as names. In response to this, a diligent A.P.T. reads the file structure of every device mount, and keeps records of directory lists.

If it is possible to delete any directory named “Temp,” or “Executables,” it is similarly possible to delete any file named “filename.txt.”

A simple illustration of an (unpleasant) easter egg of that kind might be to delete “*12_25_2013*.*” at every file mount.

Good A.P.T’s probably maintain code both for Windows and Unix trojans like this. Can OS X be far behind?


About James Johnson

I am an amateur mathematician & political theorist who enjoys (occasionally cerebral) humor.
This entry was posted in Uncategorized and tagged , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s