Port No | 22847 |
Service Name | Breach |
RFC Doc | 0 |
Protocol | TCP |
Description | A Trojan is a program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor. |
Reference Link | More Information |
Attack | Name:Breach Backdoor Breach Pro is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely log keystrokes, edit files, run applications, change ports, etc. Breach Pro uses ports 2983 and 11111 for FTP access. There are several Backdoor detection programs on the market that are said to be able to scan for and detect a Backdoor Breach pro server on your system. Some of the better known AntiVirus vendors have included detection strings in their virus definitions. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.