Ticker

6/recent/ticker-posts

Advertisement

What is trojan horse

What is trojan horse?



Trojan and Trojan horse is a malware that is often disguised as legitimate software. Malware that appears in to victim computers performs a desired task for a user while performing a harmful task without the user's knowledge or consent.

If system are infected trojan with these actions can include:
·         Deletes Data
·         Copies data
·         Modifies Data
·         Blocks Data
·         Disrupts the performance of the target computers or networks

How Can Trojans impact on your computer

Trojans are classified according to the type of actions that they can perform on your computer:

Backdoor: A backdoor Trojan gives to hacker’s malicious access to the computer and takes remote control over the infected computer. They can entitle the malicious hacker to work on the infected computer as per the malicious intentions. Hackers can send, receive, delete and launch files, display data and reboot the computer.
Exploit: is a trojan that contains a malicious code or data to attack a vulnerable software or application that runs on infected computers.
Rootkits are developed by malware authors to gain access to the victim’s systems, while they conceal their the presence or their malicious activities from being detected to extend their presence to run and execute on the infected computer.
Trojan-Banker: is a Trojan that developed to extract user's account data, debit or credit card-related data through online banking systems, e-payment gateway.
Trojan-DDoS are developed to perform Denial of Service (DOS) attacks so as to infect the victim's web address. The malware program sends multiple requests from the victim's infected computers and forms a network with several other infected computers –to strongly enforce a the attack against the target address causing a denial of service.
Trojan-Downloader: It is developed by hackers to download and install a malicious application on the target victim's computer.
Trojan-Dropper: These programs are developed by malware authors to install Trojans and viruses and escape the detection of malicious applications. Most of the traditional antivirus programs are not able to scan all the components of this Trojan.
Trojan-Fake AV That programs pretend to operate like antivirus software. They are developed by cyber attackers to obtain money from the target user – in return, in order to detect and remove threats.
Trojan-Game Thief That type of attacker’s main targets for Trojan-Game Thief are online gamers and their prime motive is to steal the user account information.
Trojan-IM programs primarily extract users' logins and passwords of facebook MSN and Skype and many more.
Trojan-Ransom that virus victim's computers don’t perform their function correctly and also it not able to let the user, use certain data.
The Hackers would demand a ransom to be paid by the victim users to unblock the data and restore the computer’s performance.
.
Trojan-SMS If mobile infected with Trojan, him able to send text messages from the victim's mobile device to other phone numbers.
Trojan-Spy that programs can spy on how the incited users using computer – for example, tracking data, taking screenshots or extracting a list of running applications.

Trojan-Mail finder that virus programs are developed by hackers to extract email addresses from the victim's computers.


Post a Comment

0 Comments