Wiretap Trojan

Definition - What does Wiretap Trojan mean?

A wiretap Trojan is a type of Trojan virus which records VoIP calls and IM conversations. In the case of VoIP calls such as Skype, the audio data is captured before it can be encrypted and sent over the Internet, and then saved as an MP3 file locally on the infected computer. The messages from an IM application can also be saved to a kind of text file before being encrypted and sent online. The Trojan includes a backdoor to allow the hacker to retrieve the saved files or the Trojan can simply send it to an anonymous address.

Techopedia explains Wiretap Trojan

Wiretap Trojans are infamous for being used by hackers and government authorities alike since wiretapping, according to government authorities, helps ensure national safety by providing clear intelligence that they can act on immediately if the need calls for it. A wiretap Trojan is like any other Trojan in terms of the way it infects and runs on a host computer, the only difference is its function.

A famous wiretap Trojan example, and possibly the first, is Trojan.PeskySpy which surfaced in 2009, specifically targeting Skype calls and instant messages. This type of Trojan was believed to have been created because of the surge in popularity of VoIP programs, Skype specifically. However, it is believed that the Trojan does not exploit inherent flaws in Skype’s programming but rather intercepts the audio signals by intercepting the messages between the underlying OS API calls to the audio device and Skype itself, and then saving the audio locally as MP3 files. This bypasses the encryption that is done by Skype prior to sending the audio data over the Internet. The Trojan itself creates a backdoor in the infected computer to allow the attacker to send the recorded calls to a predetermined location.

Another major example of a wiretap Trojan is the so-called R2D2 Trojan, also known as 0zapftis, which was believed to have been used by the German government to monitor Skype, IM and VoIP calls of alleged criminals and terrorist suspects in 2011. The use of a Bundestrojaner or federal Trojan is permitted to an extent under German law.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.