ALERT

[WEBINAR] See the Whole Story: The Case for a Visualization Platform

Wiretap Trojan

Definition - What does Wiretap Trojan mean?

A wiretap Trojan is a type of Trojan virus which records VoIP calls and IM conversations. In the case of VoIP calls such as Skype, the audio data is captured before it can be encrypted and sent over the Internet, and then saved as an MP3 file locally on the infected computer. The messages from an IM application can also be saved to a kind of text file before being encrypted and sent online. The Trojan includes a backdoor to allow the hacker to retrieve the saved files or the Trojan can simply send it to an anonymous address.

Techopedia explains Wiretap Trojan

Wiretap Trojans are infamous for being used by hackers and government authorities alike since wiretapping, according to government authorities, helps ensure national safety by providing clear intelligence that they can act on immediately if the need calls for it. A wiretap Trojan is like any other Trojan in terms of the way it infects and runs on a host computer, the only difference is its function.

A famous wiretap Trojan example, and possibly the first, is Trojan.PeskySpy which surfaced in 2009, specifically targeting Skype calls and instant messages. This type of Trojan was believed to have been created because of the surge in popularity of VoIP programs, Skype specifically. However, it is believed that the Trojan does not exploit inherent flaws in Skype’s programming but rather intercepts the audio signals by intercepting the messages between the underlying OS API calls to the audio device and Skype itself, and then saving the audio locally as MP3 files. This bypasses the encryption that is done by Skype prior to sending the audio data over the Internet. The Trojan itself creates a backdoor in the infected computer to allow the attacker to send the recorded calls to a predetermined location.

Another major example of a wiretap Trojan is the so-called R2D2 Trojan, also known as 0zapftis, which was believed to have been used by the German government to monitor Skype, IM and VoIP calls of alleged criminals and terrorist suspects in 2011. The use of a Bundestrojaner or federal Trojan is permitted to an extent under German law.

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
Free Whitepaper: The Path to Hybrid Cloud
Free Whitepaper: The Path to Hybrid Cloud:
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.