What is a Trojan Horse ?
using.
Now imagine that while I do this, I can even explore your hard drive, grab your passwords and private data, use your internet connection, and maybe even take your credit card details. If I really want to, I can even format your hard drive. But why should I? It’s far more useful to remain unseen. All of these are possible with a Trojan on your system.
Trojan horses, otherwise referred to as trojans, are simply programs that pretend to be something else. A common scenario is that a person receives a perfectly legitimate email, that may even appear to be from a friend or work colleague.
The file may look like a photograph, sound file or even a game. When the user tries to open the file, it often appears that nothing has happened. If they are unlucky, they may just have installed something quite nasty on their hard drive.
It could be a basic file that deletes a handful of system files, or it may be something a little more advanced, that can even allow other people full access to your system and files. If you think it sounds unlikely, think again. This happens every single day, to users all over the world.
The file may look like a photograph, sound file or even a game. When the user tries to open the file, it often appears that nothing has happened. If they are unlucky, they may just have installed something quite nasty on their hard drive.
It could be a basic file that deletes a handful of system files, or it may be something a little more advanced, that can even allow other people full access to your system and files. If you think it sounds unlikely, think again. This happens every single day, to users all over the world.
What can a trojan horse do to my system?
Right now, you are reading this page sitting at your PC. Imagine that I am sitting right behind you, looking over your shoulder at everything you see and do. As well as watching the web pages that you visit, I can also see the emails you send and receive, the documents you type, and all the files that you areusing.
Now imagine that while I do this, I can even explore your hard drive, grab your passwords and private data, use your internet connection, and maybe even take your credit card details. If I really want to, I can even format your hard drive. But why should I? It’s far more useful to remain unseen. All of these are possible with a Trojan on your system.
Working of Trojans
- Attacker gets access to the trojaned system as the system goes online
- By way of the access provided by the trojan attacker can stage attacks of different types.
Various Trojan Types
- Remote Access Trojans
- Password Sending Trojans
- Keyloggers
- Destructive
- Denial Of Service (DoS) Attack Trojans
- Proxy/Wingate Trojans
- FTP Trojans
- Software Detection Killers
Modes of Transmission
- Attachments
- Physical Access
- Browser And E-mail Software Bugs
- NetBIOS (File Sharing)
- Fake Programs
- Un-trusted Sites And Freeware Software