Close

August 1, 2017

Trojans – Devious computer viruses

Trojans

Trojans – Inspired by the art of war

Most know the story of the Trojan Horse used by the Greeks to enter the city of Troy and win the war. After 10 years of siege and nothing to show for it, the Greeks constructed a giant wooden horse and hid a small force inside. Pretending to sail away after leaving the horse for the Trojans. They then pulled it into the city as a trophy after seeing the Greeks flee. That night the Greeks crept out and opened the gates for the rest of the Greek army who sailed back under the cover of night. Destroying the city and ending the war.

In addition, the computer virus version is just as devious. A Trojan horse virus is a type of malware that is often disguised as legitimate software. This type of malware is a typical tool employed by cybercriminals. Once they are activated Trojans will deploy spyware, keyloggers, and backdoor access to your system. This allows a cybercriminal to: delete, block, modify, and copy your data. Unlike typical viruses and worms, Trojans cannot self-replicate and are classified based on the effects they have on your computer.

Backdoor

– Gives cybercriminals remote access and control over the computer, granting administrator rights to the malicious user to do anything they please. Often, backdoor trojans are used to connect a group of infected computers together to create what is known as a botnet. These are common networks used by cybercrooks to carry out other illicit acts: such as sending out phishing emails and scams.

Exploit

– Uses vulnerabilities in application software to allow access to the computer.

Rootkit

– Are designed to hide processes, services, and other activities on your system. They keep the malicious activities of the programs from being detected.

Trojan-Stealers

(Bankers, IM, SMS, Ransom, GameThief, etc) – These trojans are designed to steal account information from any accounts you may use. Often these will be used to extort money from the victims or to be sold to the highest bidder.

Trojan Prevention

Consequently, there are many forms of malware and other cybercrime techniques, you should always be proactive in keeping your system as up to date as possible. Since, most viruses, malware, and trojans take advantage of security flaws or vulnerabilities. Therefore, it is also prudent to keep your knowledge base current as well. Malware and other cybercriminal techniques are always evolving. Be wary of unknown emails, double check file extensions and links, they will often be cleverly disguised to look as legitimate as possible. In addition, check out our blog on Phishing and how to identify it. Phishing Blog