Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
After a computer is infected with GTbot, the trojan runs a stealth mIRC client without the user's knowledge. The attacker can then gain information about the infected computer, as well as use the infected computer to launch a denial-of-service (DoS) attack.
Popular files names for GTbot are as follows: temp.exe, miri.inc, script.inl, temp.scr and WHVLXD.DAT.
Do you work in the tech industry? Help us learn more about why the gender gap still exists in tech by taking this quick survey! Survey respondents will also be entered to win a $100 Amazon Gift Card!