Computer viruses or Trojan horses can be a type of malware that is often disguised as legitimate software. Trojan horses are often used by cyber thieves and hackers trying to gain access to a user's system. Users are usually fooled by some sort of social engineering to load and run a Trojan horse on their system. Trojan horses, when activated, allow cybercriminals to spy on you, steal sensitive data and gain backdoor access to your system. These actions include:
•
Delete data
•
Block data
•
Change data
•
Copy data
•
Poor performance of your computer or computer network
Unlike computer viruses and worms, Trojans are not ready
to self-replicate.
The impact of Trojan horses on you
Trojans are categorized according to the type of action
they perform on your computer.
• back door
Backdoor Trojans direct malicious users remotely from an
infected computer. This allows authors to try anything they want to do on an
infected computer, such as sending, receiving, launching, deleting files,
viewing data, restarting a PC, and so on. Backdoor Trojans often do not
integrate a collection of victims' computers to create a botnet or zombie
network used for criminal purposes.
• Exploit
Exploits are programs that contain data or code that
exploits vulnerabilities in application software running on your computer.
• Rootkit
Rootkits are designed to hide certain objects or
activities in the system. Often, their main purpose is to stop the detection of
malicious programs. This allows you to spend more time running the program on
the infected computer.
• Trojan-Bunker
The Trojan-Banker program is designed to steal account
data from online banking systems, electronic payment systems, credit or debit
cards.
• Trojan-DDoS
These programs carry out DoS (Denial of Service) attacks
against targeted web addresses. By sending multiple requests from a computer
and many other infected computers, an attack can overwhelm the target address
and cause a denial of service.
• Trojan-Downloader
Trojan Horses-Downloaders can download and install new
versions of malicious programs on your computer, such as Trojan horses and
adware.
• Trojan-Dropper
These programs are used by hackers to infiltrate Trojan
horses and viruses and to stop the detection of malicious programs. Not all
antivirus programs can scan all the components in this type of Trojan horse.
• Trojan-FakeAV
The Trojan-FakeAV program simulates the activity of
antivirus software. They are designed to force you money-mutually for threat
detection and elimination ... although the threats they report literally do not
exist.
• Trojan-Game Thief
This type of program steals user account information from
online gamers.
• Trojan-IM
The Trojan-IM program steals logins and passwords for
high-speed messaging programs such as ICQ, MSN Messenger, AOL Instant
Messenger, Yahoo Pager, and Skype.
• Trojan-Ransom
This type of Trojan horse may change data on your
computer so that it does not work properly. Otherwise, certain data will not be
available. Criminals only restore the performance of your computer or unblock
your data after you pay the ransom you demand from them.
• Trojan-SMS
These programs can be costly by sending text messages
from mobile devices to premium rate phone numbers.
• Trojan-Spy
Trojan-Spy programs can spy on computer usage by tracking
information entered from the keyboard, taking screenshots, and inventorying
running applications.
• Trojan-Mailfinder
These programs can collect email addresses from your
computer.
• Other types of Trojans include:
o Trojan-ArcBomb
o Trojan-Clicker
o Trojan notification feature
o Trojan horse proxy
o Trojan-PSW
How to protect yourself from Trojan horses
By installing effective anti-malware software, you can
protect devices such as PCs, laptops, Macs, tablets and smartphones from Trojan
horses. Strict anti-malware solution.
Comments
Post a Comment