Legitimate applications are applications that may be installed and used on computers of users and are intended for performing user tasks. However, certain types of legitimate applications can be exploited by hackers to harm the user's computer or the enterprise network. If hackers gain access to these applications, or if they plant them on the user's computer, some of their features can be used to compromise the security of the user's computer or the enterprise network.

These applications include IRC clients, auto-dialers, file downloaders, computer system activity monitors, password management utilities, and web servers for FTP, HTTP, or Telnet services.

Such applications are described in the table below.

Legitimate applications

 

Type

Name

Description

Client-IRC

Online chat clients

Users install these applications to communicate with people in Internet Relay Chats. Hackers use them to spread malware.

Dialer

Auto-dialers

They can establish hidden phone connections over a modem.

Downloader

Downloader programs

They can covertly download files from web pages.

Monitor

Monitoring programs

They allow monitoring of activities on the computer on which they are installed (seeing which applications are active and how they exchange data with applications that are installed on other computers).

PSWTool

Password recovery tools

They allow viewing and recovery of forgotten passwords. Hackers secretly plant them on computers for the same purpose.

RemoteAdmin

Remote administration programs

They are widely used by system administrators. These programs allow someone to obtain access to the interface of a remote computer to monitor and manage it. Hackers secretly plant them on computers for the same purpose: to monitor and control computers.

Legitimate remote administration applications differ from Backdoor-type Trojans used for remote administration. Trojans have the ability to independently infiltrate a system and install themselves, while legitimate applications are unable to do so.

Server-FTP

FTP servers

They perform FTP server functions. Hackers plant them on computers to gain remote access to them over the FTP protocol.

Server-Proxy

Proxy servers

They perform proxy server functions. Hackers plant them on computers to send spam from them.

Server-Telnet

Telnet servers

They perform Telnet server functions. Hackers plant them on computers to gain remote access to them over the Telnet protocol.

Server-Web

Web servers

They perform web server functions. Hackers plant them on computers to gain remote access to them over the HTTP protocol.

RiskTool

Tools for managing a virtual machine

They offer the user additional capabilities for managing the computer. These tools allow the user to hide files or windows of active applications and terminate active processes.

NetTool

Network tools

They offer the user of the computer on which they are installed additional capabilities for interacting with other computers on the network. These tools enable the user to restart them, detect open ports, and start applications that are installed on the computers.

Client-P2P

P2P network clients

They enable operation on peer-to-peer (P2P) networks. They can be used by hackers to spread malware.

Client-SMTP

SMTP clients

They send email messages without the user's knowledge. Hackers plant them on computers to send spam from them.

WebToolbar

Web toolbars

They add toolbars to the interfaces of other applications to use search engines.

FraudTool

Fake programs

They pass themselves off as other programs. For example, there are fake anti-virus programs that display messages about malware detection. However, in reality, they do not find or disinfect anything.

See also

Protecting network traffic

Configuring network traffic protection

Configuring archive processing

Configuring default values of protection settings

Page top