What is trojan horse?
Trojan and Trojan horse is a malware that is
often disguised as legitimate software. Malware that appears in to victim
computers performs a desired task for a user while performing a harmful task
without the user's knowledge or consent.
If
system are infected trojan with these actions can include:
·
Deletes Data
·
Copies data
·
Modifies Data
·
Blocks Data
·
Disrupts the performance of the target computers or
networks
How Can Trojans impact on your computer
Trojans
are classified according to the type of actions that they can perform on your
computer:
Backdoor: A backdoor Trojan gives
to hacker’s malicious access to the computer and takes remote control over the
infected computer. They can entitle the malicious hacker to work on the
infected computer as per the malicious intentions. Hackers can send, receive,
delete and launch files, display data and reboot the computer.
Exploit: is a trojan that contains
a malicious code or data to attack a vulnerable software or application that
runs on infected computers.
Rootkits are developed by malware
authors to gain access to the victim’s systems, while they conceal their the presence or their malicious activities from being detected to extend their
presence to run and execute on the infected computer.
Trojan-Banker: is a Trojan that
developed to extract user's account data, debit or credit card-related data
through online banking systems, e-payment gateway.
Trojan-DDoS are developed to perform
Denial of Service (DOS) attacks so as to infect the victim's web address. The
malware program sends multiple requests from the victim's infected computers and
forms a network with several other infected computers –to strongly enforce a the attack against the target address causing a denial of service.
Trojan-Downloader: It is developed by
hackers to download and install a malicious application on the target victim's
computer.
Trojan-Dropper: These programs are
developed by malware authors to install Trojans and viruses and escape the
detection of malicious applications. Most of the traditional antivirus programs
are not able to scan all the components of this Trojan.
Trojan-Fake AV That programs pretend to
operate like antivirus software. They are developed by cyber attackers to
obtain money from the target user – in return, in order to detect and remove
threats.
Trojan-Game Thief That type of attacker’s main
targets for Trojan-Game Thief are online gamers and their prime motive is to
steal the user account information.
Trojan-IM programs primarily
extract users' logins and passwords of facebook MSN and Skype and many more.
Trojan-Ransom that virus victim's
computers don’t perform their function correctly and also it not able to let
the user, use certain data.
The Hackers
would demand a ransom to be paid by the victim users to unblock the data and
restore the computer’s performance.
.
Trojan-SMS If mobile infected with Trojan,
him able to send text messages from the victim's mobile device to other phone numbers.
Trojan-Spy that programs can spy on
how the incited users using computer – for example, tracking data, taking
screenshots or extracting a list of running applications.
Trojan-Mail finder that virus programs are
developed by hackers to extract email addresses from the victim's computers.
0 Comments