- Dec 23, 2014
- 8,591
This application (currently) is not a typical malware. So far, no one tried to install/run it on the computers of unaware people.
It is rather a cyber weapon that is used by people who want to use it as intended by the creators. It can attack only some specific targets which are chosen by the government.
In theory, such applications can be used as a part of malware, similarly to the legal coinminer applications. The purpose can be similar = use the computers of other people (without their consent) for your tasks.
I am not sure about the future, but in a strange world, such applications can be used as a kind of adware to support one side of the conflict.
I think that this application should be classified as a "cyber weapon" (probably a new category) or as a hack tool.
It is rather a cyber weapon that is used by people who want to use it as intended by the creators. It can attack only some specific targets which are chosen by the government.
In theory, such applications can be used as a part of malware, similarly to the legal coinminer applications. The purpose can be similar = use the computers of other people (without their consent) for your tasks.
I am not sure about the future, but in a strange world, such applications can be used as a kind of adware to support one side of the conflict.
I think that this application should be classified as a "cyber weapon" (probably a new category) or as a hack tool.
Last edited: