2. INTRODUCTIO
N
What is TROJAN? How it works?
A Trojan horse, or Trojan, is a type of malicious code or software that
looks legitimate but can take control of your computer. A Trojan is
designed to damage, disrupt, steal, or in general inflict some other
harmful action on your data or network.
A Trojan acts like a bonafide application or file to trick you. It seeks
to deceive you into loading and executing the malware on your
device. Once installed, a Trojan can perform the action it was
designed for.
Viruses can execute and replicate themselves.ATrojan cannot.A
user has to execute Trojans.
3. Different Types of Trojan Horse
types of Trojan horses are:
Remote Access Trojans : Abbreviated as RATs, a Remote Access Trojan is
designed to providethe attacker with complete control of the victim’s system.
Data Sending Trojans : This type of Trojan horses is designed to provide
the attackerwith sensitive data such as passwords, credit card information,
log files, e-mail address or IM contact lists.
Destructive Trojans : This Trojan horse is designed to destroy and
delete files, and it’s more like a virus than any other Trojan. It can often go
undetectedby anti virus software.
4. Common Types of Trojan Malware
Downloader Trojan : This Trojan targets your already-infected
computer. It downloads and installs new versions of malicious
programs. These can include Trojans and adware.
Game-thief Trojan : The losers here may be online gamers. This
Trojan seeks to steal their account information.
Infostealer Trojan : As it sounds, this Trojan is after data on your
infected computer.
SMS Trojan : This type of Trojan infects your mobile device and
can send and intercept text messages. Texts to premium-rate
numbers can drive up your phone costs.
5. How will you know if you’ve
been infected?
A Trojan horse will have multiple extensions because it attaches itself to other
files that might look somethingI like LOVELETTERFORYOU.TXT.vbs
Common lookouts for being Affected by Trojan horse
1. Slow computer.
2. Blue screen of death.
3. Strange pop-ups.(adware)
4. Applications acting strange.
5. Disabled security application such as UAC.
6. Insufficient
6. How to avoid being Affected
As with protecting against most common cybersecurity threats, effective cybersecurity
software should be your front line of protection. An effective internet security solution should
run fast, frequent scans and alert you as soon as a Trojan virus is detected.
1. Never download or install software from a source you don’t trust
completely
2. Never open an attachment or run a program sent to you in an email from
someone you don’t know.
3. Keep all software on your computer up to date with the latest patches
4. Make sure a Trojan antivirus is installed on your computer
5. Look out for file Extensions
7. How to Remove?
Using Anti-Malware Software in your System
Restoring Computer to previous State
8. things to take care on
We need to be careful when download something. We also
need an anti-virus to protect our computer from be infected
by virus.
We need to be a smart user because this can help us from
be tricked with nice thing but behind the scenes it infects our
computer with a Trojan or Worm.