In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer
which gets easily executed on the victim machine without raising any suspicion. Today’s end users are quite knowledgeable about malwares and viruses. Instead of sending games and fun executables, Hackers today are quite successful in spreading the Trojans using Rogue security software.What is Rogue security software?
What is the most efficient way an attacker located in remote location to infect this banking Trojan on a victim’s machine?