Today on history channel, The Trojan Horse malware
A Trojan horse or Trojan is a type
of malware that is often disguised as legitimate software. Trojans can be
employed by cyber-thieves and hackers trying to gain access to users' systems.
Users are typically tricked by some form of social engineering into loading and
executing Trojans on their systems. Once activated, Trojans can enable
cyber-criminals to spy on you, steal your sensitive data, and gain backdoor
access to your system. These actions can include:
·
Crashing the
computer or device.
·
Modification
or deletion of files.
·
Data corruption.
·
Block
anti-virus programs.
·
Block
installation process.
·
Formatting disks,
destroying all contents.
·
Spreading
malware across the network.
·
Spying on user
activities and access sensitive information.
Unlike computer viruses and worms,
Trojans are not able to self-replicate.
How Trojans can harm you:
·
Backdoor
A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
·
Exploit
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
· Rootkit
Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
·
Trojan-Banker
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
·
Trojan-DDoS
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.
·
Trojan-Downloader
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
·
Trojan-Dropper
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
·
Trojan-FakeAV
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.
·
Trojan-GameThief
This type of program steals user account information from online gamers.
This type of program steals user account information from online gamers.
·
Trojan-IM
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
·
Trojan-Ransom
This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
·
Trojan-SMS
These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.
These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.
·
Trojan-Spy
Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
·
Trojan-Mailfinder
These programs can harvest email addresses from your computer.
These programs can harvest email addresses from your computer.
Other types of Trojans:
o
Trojan-ArcBomb
o
Trojan-Clicker
o
Trojan-Notifier
o
Trojan-Proxy
o
Trojan-PSW
How Trojans can fuck up your
system:
Use of resources or identity
·
Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute
Denial-of-service attacks)
·
Using computer resources for mining crypto currencies
·
Using the infected computer as proxy for illegal
activities and/or attacks on other computers.
·
Infecting other connected devices on the network.
Money theft, ransom
·
Electronic money theft
·
Installing ransomware such as CryptoLocker
Data theft
·
Data theft, including for industrial espionage
·
User passwords or payment card information
·
User personally
identifiable information
·
Trade secrets
Spying,
surveillance or stalking
·
Keystroke logging
·
Watching the user's screen
·
Viewing the user's webcam
·
Controlling the computer system
remotely
So? How to protect yourself?
1.
Protect your computer with
strong security software and make sure to keep it up
to date. A reputable anti-malware software guarantees trusted PC
protection from Trojans, hackers, spyware, and more. Integrated anti-virus,
anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work
together to combat today’s advanced multi-faceted attacks.
2.
Use a security-conscious
Internet service provider (ISP) that implements strong anti-spam
and anti-phishing procedures. For example, AOL blocks known phishing sites so that
customers can’t reach them.
3.
Enable automatic Windows
updates or download Microsoft updates regularly to keep
your operating system patched against known vulnerabilities. Install patches
from other software manufacturers as soon as they are distributed. A fully
patched computer behind a firewall is the best defense against Trojan and
spyware installation.
4.
Use extreme caution when
opening attachments. Configure your anti-virus
software to automatically scan all email and instant message attachments. Make
sure your email program doesn’t automatically open attachments or automatically
render graphics, and ensure that the preview pane is turned off. This will
prevent macros from executing. Never open unsolicited business emails, or attachments
that you’re not expecting even from people you know.
5.
Be careful when engaging in
peer-to-peer (P2P) file-sharing. Trojans sit within file sharing
programs waiting to be downloaded. Use the same precautions when downloading
shared files that you do for email and IM. Avoid downloading files with the
extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and
.cmd. Anti-virus software and a good firewall will protect your
system from malicious files.
6.
Download the latest version of
your browser to ensure that it is also
fully updated and utilizes the latest technologies to identify and filter out
phishing sites that can install Trojans.
7.
Use security precautions for
your cell phone and Wi-Fi devices. Trojans arrive as an email/IM
attachment, are downloaded from the Internet, or are uploaded along with other
data from a desktop. Cell phone viruses are in their infancy, but will become
more common as more people buy phones with advanced features.
8.
Configure your instant
messaging application correctly. Make sure it does not open
automatically when you fire up your computer. Turn off your computer and
disconnect the DSL or modem line when you’re not using it. Beware of spam-based
phishing schemes and don’t click links in emails or IM.
9.
Be certain a web site is
legitimate before you go there. Use software that automatically
checks this, such as AccountGuard and ScamBlocker from Earthlink.
10. Back up your files regularly and
store the backups somewhere besides your PC. If you fall victim to a Trojan
attack, you can recover your photos, music, movies, and personal information
like tax returns and bank statements.
Naming a few of them:
Private and governmental
·
FinFisher –
Lench IT solutions / Gamma International
·
DaVinci / Galileo RCS –
HT S.r.l. (hacking team)
·
0zapftis / r2d2 StaatsTrojaner – DigiTask
·
TAO QUANTUM/FOXACID –
NSA
·
Magic Lantern –
FBI
·
WARRIOR PRIDE –
GCHQ
Publicly available
·
Netbus –
1998 (published)
·
Sub7 by
Mobman – 1999 (published)
·
Back Orifice –
1998 (published)
·
Beast –
2002 (published)
·
Bifrost Trojan –
2004 (published)
·
DarkComet –
2008 (published)
·
Blackhole exploit kit –
2012 (published)
·
Gh0st RAT –
2009 (published)
·
MegaPanzer BundesTrojaner – 2009 (published)
Detected by
security researchers
·
Clickbot.A –
2006 (discovered)
·
Zeus – 2007
(discovered)
·
Flashback Trojan –
2011 (discovered)
·
ZeroAccess –
2011 (discovered)
·
Koobface –
2008 (discovered)
·
Vundo –
2009 (discovered)
·
Meredrop –
2010 (discovered)
·
Coreflood –
2010 (discovered)
·
Tiny Banker Trojan –
2012 (discovered)
·
Shedun Android
malware – 2015 (discovered)
Comments
Post a Comment