SlideShare a Scribd company logo
ICT-ED INSTITUTE OF SCIENCE
AND TECHNOLOGY INC.
Innovation for Quality Education
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
TOPICS TO DISCUSS:
•Introduction of Trojan Horse
•How do Trojan works
•Types of Trojan Horse
•How to Recognize a Trojan Attack
•Examples of Trojan Horse Attacks
•How to prevent Trojan Horse
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
IS A TROJAN A VIRUS OR MALWARE?
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
WHAT IS A TROJAN HORSE?
•Trojan horse is a type of malware that downloads onto a
computer and disguised as a legitimate program.
•Typically gets hidden as an attachment in an email or a
free-to-download file, then transfers onto the user’s
device.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
BRIEF HISTORY OF THE TROJAN HORSE
•The Trojan gets its name from the Trojan Horse in the Greek epic
poem The Iliad. In the story, the Greek hero Odysseus hatches a
plan to construct a giant wooden horse that his enemies would
receive into their city as a gift. The enemies of the city of Troy were
able to get inside the city gates using a horse they pretended was a
gift but within the belly of the horse hid a legion of soldiers, who
emerged under cover of night to decimate the city of Troy from
within.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW DO TROJAN WORKS?
•Trojans work by masquerading as legitimate files,
with the goal of tricking victims into clicking,
opening, or installing them. Once this happens, the
Trojan begins installing malware on your
device, spying on you, or causing other types of
harm.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
1. Backdoor Trojans: A backdoor Trojan enables an attacker to gain remote access to
a computer and take control of it using a backdoor.
2. Banker Trojan: A banker Trojan is designed to target users’ banking accounts and
financial information.
3. Distributed denial-of-service (DDoS) Trojans: These Trojan programs carry out
attacks that overload a network with traffic.
4. Dropper or downloader Trojans: A downloader Trojan targets a computer that has
already been infected by malware, then downloads and installs more malicious
programs to it.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
5. Exploit Trojan: An exploit malware program contains code or data that takes
advantage of specific vulnerabilities within an application or computer system.
6. Fake antivirus Trojan: A fake antivirus Trojan simulates the actions of legitimate
antivirus software.
7. Game-thief Trojan: A game-thief Trojan is specifically designed to steal user
account information from people playing online games.
8. Instant messaging (IM) Trojan: This type of Trojan targets IM services to steal
users’ logins and passwords. It targets popular messaging platforms such as AOL
Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
9. Info stealer Trojans: Data theft is the goal with info stealer Trojans. They’ll comb
through your device for sensitive personal data, then send it back to the hacker who
attacked you.
10. Mailfinder Trojan: aims to harvest and steal email addresses that have been
stored on a computer.
11. Ransom Trojan: seek to impair a computer’s performance or block data on the
device so that the user can no longer access or use it.
12. Remote access Trojan: Similar to a backdoor Trojan, this strand of malware gives
the attacker full control of a user’s computer.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
13. Rootkit Trojan: is a type of malware that conceals itself on a user’s computer.
14. Short message service (SMS) Trojan: infects mobile devices and is capable
of sending and intercepting text messages.
15. Spy Trojan: are designed to sit on a user’s computer and spy on their activity.
16. Sunburst: was released on numerous SolarWinds Orion Platform. Victims
were compromised by trojanized versions of a legitimate SolarWinds digitally
signed file named: SolarWinds.Orion.Core.BusinessLayer.dll
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW TO RECOGNIZE A TROJAN ATTACK
• Your computer feels slow.
• Your computer crashes and freezes.
• There are unfamiliar apps on your device.
• Internet redirects.
• Changes to your desktop, taskbar, or browser.
• More pop-ups.
• Your antivirus software is deactivated.
• The best way to recognize a Trojan is to search a device using a Trojan
scanner or malware-removal software.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
EXAMPLES OF TROJAN HORSE ATTACKS
1. Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool
which enables an attacker to use a device to mine cryptocurrency to infect devices.
2. Tiny Banker: enables hackers to steal users’ financial details. It was discovered
when it infected at least 20 U.S. banks.
3. Zeus or Zbot: Zeus is a toolkit that targets financial services and enables
hackers to build their own Trojan malware. The source code uses techniques like
form grabbing and keystroke logging to steal user credentials and financial details.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
EXAMPLES OF TROJAN HORSE ATTACKS
4. Emotet- First detected in 2014, Emotet began as a banking Trojan. But after
cybercriminals began using it to distribute other malware instead, Emotet made
serious waves in cybersecurity.
5. Shedun- Trojans aren’t just for Windows. Shedun is an Android adware Trojan
horse that repackages legitimate Android apps with bogus adware, before rehosting
them on third-party download portals. When you install the app from one of these
sites, you get the adware along with it.
By 2016, Shedun was reported to have infected over 10 million Android devices.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW TO PREVENT TROJAN HORSE
1. Download apps and software from official sources.
2. Don’t open unknown email attachments or click strange links.
3. Use an ad blocker or secure browser.
4. Be skeptical of free software.
5. Don’t click web banners or unfamiliar links.
6. Use an antivirus tool.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
THANK YOU!!

More Related Content

Similar to TROJAN HORSE.pptx

Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
Malware
MalwareMalware
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Debabrata Singh
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
jyoti_lakhani
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
faadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
HArshMangasuli
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
HeroZero12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ssuser77bda9
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
VarunJain65422
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
KeerthikaaThiyagaraj
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
JacobJose37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
SASASASA93
 

Similar to TROJAN HORSE.pptx (20)

Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Malware
MalwareMalware
Malware
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

More from KristleJoyDimayuga

The-Global-Interstate-PPT.pptxxxxxxxxxxx
The-Global-Interstate-PPT.pptxxxxxxxxxxxThe-Global-Interstate-PPT.pptxxxxxxxxxxx
The-Global-Interstate-PPT.pptxxxxxxxxxxx
KristleJoyDimayuga
 
spanish language in foreign language 1 .
spanish language in foreign language 1 .spanish language in foreign language 1 .
spanish language in foreign language 1 .
KristleJoyDimayuga
 
Thesis-Format-Chap-1-3.pdf
Thesis-Format-Chap-1-3.pdfThesis-Format-Chap-1-3.pdf
Thesis-Format-Chap-1-3.pdf
KristleJoyDimayuga
 
Ambrosia-ppt.pptx
Ambrosia-ppt.pptxAmbrosia-ppt.pptx
Ambrosia-ppt.pptx
KristleJoyDimayuga
 
Global-and-regional-cooperation-and-integration.pptx
Global-and-regional-cooperation-and-integration.pptxGlobal-and-regional-cooperation-and-integration.pptx
Global-and-regional-cooperation-and-integration.pptx
KristleJoyDimayuga
 
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptxSCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
KristleJoyDimayuga
 
Environmental-Science.pptx
Environmental-Science.pptxEnvironmental-Science.pptx
Environmental-Science.pptx
KristleJoyDimayuga
 
CHAPTER 6.pptx
CHAPTER 6.pptxCHAPTER 6.pptx
CHAPTER 6.pptx
KristleJoyDimayuga
 
CHAPTER 5.pptx
CHAPTER 5.pptxCHAPTER 5.pptx
CHAPTER 5.pptx
KristleJoyDimayuga
 
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
CPAR-TAX-General-Principles-Batch-91-Handout.pdfCPAR-TAX-General-Principles-Batch-91-Handout.pdf
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
KristleJoyDimayuga
 
Real-Number-System.pptx
Real-Number-System.pptxReal-Number-System.pptx
Real-Number-System.pptx
KristleJoyDimayuga
 

More from KristleJoyDimayuga (11)

The-Global-Interstate-PPT.pptxxxxxxxxxxx
The-Global-Interstate-PPT.pptxxxxxxxxxxxThe-Global-Interstate-PPT.pptxxxxxxxxxxx
The-Global-Interstate-PPT.pptxxxxxxxxxxx
 
spanish language in foreign language 1 .
spanish language in foreign language 1 .spanish language in foreign language 1 .
spanish language in foreign language 1 .
 
Thesis-Format-Chap-1-3.pdf
Thesis-Format-Chap-1-3.pdfThesis-Format-Chap-1-3.pdf
Thesis-Format-Chap-1-3.pdf
 
Ambrosia-ppt.pptx
Ambrosia-ppt.pptxAmbrosia-ppt.pptx
Ambrosia-ppt.pptx
 
Global-and-regional-cooperation-and-integration.pptx
Global-and-regional-cooperation-and-integration.pptxGlobal-and-regional-cooperation-and-integration.pptx
Global-and-regional-cooperation-and-integration.pptx
 
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptxSCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
 
Environmental-Science.pptx
Environmental-Science.pptxEnvironmental-Science.pptx
Environmental-Science.pptx
 
CHAPTER 6.pptx
CHAPTER 6.pptxCHAPTER 6.pptx
CHAPTER 6.pptx
 
CHAPTER 5.pptx
CHAPTER 5.pptxCHAPTER 5.pptx
CHAPTER 5.pptx
 
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
CPAR-TAX-General-Principles-Batch-91-Handout.pdfCPAR-TAX-General-Principles-Batch-91-Handout.pdf
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
 
Real-Number-System.pptx
Real-Number-System.pptxReal-Number-System.pptx
Real-Number-System.pptx
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

TROJAN HORSE.pptx

  • 1. ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC. Innovation for Quality Education
  • 2. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education TOPICS TO DISCUSS: •Introduction of Trojan Horse •How do Trojan works •Types of Trojan Horse •How to Recognize a Trojan Attack •Examples of Trojan Horse Attacks •How to prevent Trojan Horse
  • 3. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education IS A TROJAN A VIRUS OR MALWARE?
  • 4. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education WHAT IS A TROJAN HORSE? •Trojan horse is a type of malware that downloads onto a computer and disguised as a legitimate program. •Typically gets hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device.
  • 5. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education BRIEF HISTORY OF THE TROJAN HORSE •The Trojan gets its name from the Trojan Horse in the Greek epic poem The Iliad. In the story, the Greek hero Odysseus hatches a plan to construct a giant wooden horse that his enemies would receive into their city as a gift. The enemies of the city of Troy were able to get inside the city gates using a horse they pretended was a gift but within the belly of the horse hid a legion of soldiers, who emerged under cover of night to decimate the city of Troy from within.
  • 6. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW DO TROJAN WORKS? •Trojans work by masquerading as legitimate files, with the goal of tricking victims into clicking, opening, or installing them. Once this happens, the Trojan begins installing malware on your device, spying on you, or causing other types of harm.
  • 7. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 1. Backdoor Trojans: A backdoor Trojan enables an attacker to gain remote access to a computer and take control of it using a backdoor. 2. Banker Trojan: A banker Trojan is designed to target users’ banking accounts and financial information. 3. Distributed denial-of-service (DDoS) Trojans: These Trojan programs carry out attacks that overload a network with traffic. 4. Dropper or downloader Trojans: A downloader Trojan targets a computer that has already been infected by malware, then downloads and installs more malicious programs to it.
  • 8. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 5. Exploit Trojan: An exploit malware program contains code or data that takes advantage of specific vulnerabilities within an application or computer system. 6. Fake antivirus Trojan: A fake antivirus Trojan simulates the actions of legitimate antivirus software. 7. Game-thief Trojan: A game-thief Trojan is specifically designed to steal user account information from people playing online games. 8. Instant messaging (IM) Trojan: This type of Trojan targets IM services to steal users’ logins and passwords. It targets popular messaging platforms such as AOL Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager.
  • 9. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 9. Info stealer Trojans: Data theft is the goal with info stealer Trojans. They’ll comb through your device for sensitive personal data, then send it back to the hacker who attacked you. 10. Mailfinder Trojan: aims to harvest and steal email addresses that have been stored on a computer. 11. Ransom Trojan: seek to impair a computer’s performance or block data on the device so that the user can no longer access or use it. 12. Remote access Trojan: Similar to a backdoor Trojan, this strand of malware gives the attacker full control of a user’s computer.
  • 10. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 13. Rootkit Trojan: is a type of malware that conceals itself on a user’s computer. 14. Short message service (SMS) Trojan: infects mobile devices and is capable of sending and intercepting text messages. 15. Spy Trojan: are designed to sit on a user’s computer and spy on their activity. 16. Sunburst: was released on numerous SolarWinds Orion Platform. Victims were compromised by trojanized versions of a legitimate SolarWinds digitally signed file named: SolarWinds.Orion.Core.BusinessLayer.dll
  • 11. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW TO RECOGNIZE A TROJAN ATTACK • Your computer feels slow. • Your computer crashes and freezes. • There are unfamiliar apps on your device. • Internet redirects. • Changes to your desktop, taskbar, or browser. • More pop-ups. • Your antivirus software is deactivated. • The best way to recognize a Trojan is to search a device using a Trojan scanner or malware-removal software.
  • 12. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education EXAMPLES OF TROJAN HORSE ATTACKS 1. Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool which enables an attacker to use a device to mine cryptocurrency to infect devices. 2. Tiny Banker: enables hackers to steal users’ financial details. It was discovered when it infected at least 20 U.S. banks. 3. Zeus or Zbot: Zeus is a toolkit that targets financial services and enables hackers to build their own Trojan malware. The source code uses techniques like form grabbing and keystroke logging to steal user credentials and financial details.
  • 13. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education EXAMPLES OF TROJAN HORSE ATTACKS 4. Emotet- First detected in 2014, Emotet began as a banking Trojan. But after cybercriminals began using it to distribute other malware instead, Emotet made serious waves in cybersecurity. 5. Shedun- Trojans aren’t just for Windows. Shedun is an Android adware Trojan horse that repackages legitimate Android apps with bogus adware, before rehosting them on third-party download portals. When you install the app from one of these sites, you get the adware along with it. By 2016, Shedun was reported to have infected over 10 million Android devices.
  • 14. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW TO PREVENT TROJAN HORSE 1. Download apps and software from official sources. 2. Don’t open unknown email attachments or click strange links. 3. Use an ad blocker or secure browser. 4. Be skeptical of free software. 5. Don’t click web banners or unfamiliar links. 6. Use an antivirus tool.
  • 15. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education THANK YOU!!

Editor's Notes

  1. Trojans are not viruses, but they are a type of malware. People sometimes refer to “Trojan viruses” or “Trojan horse viruses,” but there’s no such thing. That’s due to one critical difference in how viruses and Trojans infect victims. While viruses self-replicate, spreading from one victim to the next, Trojans need you to install them. That distinction is what distinguishes viruses from Trojan horse malware. Of course, viruses and Trojans themselves are both kinds of malware.
  2. disguises itself as something harmless to fool you into installing it.
  3. Trojan malware works the same way — it pretends to be something harmless, but it’s just a cover for its real, malicious intent. There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber attacks: The Trojan horse was a unique solution to the target’s defenses. In the original story, the attackers had laid siege to the city for 10 years and hadn’t succeeded in defeating it. The Trojan horse gave them the access they had been wanting for a decade. A Trojan virus, similarly, can be a good way to get behind an otherwise tight set of defenses. The Trojan horse appeared to be a legitimate gift. In a similar vein, a Trojan malware looks like legitimate software. The soldiers in the Trojan horse controlled the city’s defense system. With a Trojan virus, the malware takes control of your computer, potentially leaving it vulnerable to other “invaders.”
  4. Unlike computer viruses, a Trojan horse cannot manifest by itself, so it needs a user to download the server side of the application for it to work. This means the executable (.exe) file should be implemented and the program installed for the Trojan to attack a device’s system. 
  5. This enables the malicious actor to do whatever they want on the device, such as deleting files, rebooting the computer, stealing data, or uploading malware. A backdoor Trojan is frequently used to create a botnet through a network of zombie computers Banking Trojans infiltrate your devices and steal your financial login credentials. Hackers use them to crack your banking and other financial accounts. DDoS Trojans aim to conscript your device into a botnet: a network of linked devices controlled remotely by a hacker known as a bot herder. They’ll use the botnet to carry out distributed denial of service (DDoS) attacks that shut down other websites and internet services The dropper Trojan infects your device and sets the stage for the loader, which in turn installs a rootkit that gives a hacker access to your device. Other downloader Trojans will install other types of malwares.
  6. 5. The cyber criminal will target users through a method like a phishing attack, then use the code in the program to exploit a known vulnerability 6. fake AV Trojans pretend to detect viruses and other malware on your device, then urge you to pay for security software — which is either useless or actively malicious. When you pay, the Trojan creator gets your payment details. 7. Gaming Trojans target online gamers and steal their login info. Cybercriminals can use these to crack the accounts of high-profile players or steal valuable in-game items. 8. Targeting the instant message (IM) apps on your device, IM Trojans hijack your login credentials and help themselves to your contact list. Newer IM apps that use encryption like WhatsApp or Signal are less vulnerable than older services such as Skype or MSN Messenger — but malware is always evolving.
  7. 9. The components of infostealer Trojans can make it difficult for antivirus systems to discover them in scans. 10. mailfinder Trojans target email apps like Microsoft Office and plumb them for email addresses. Cybercriminals can add any plundered email addresses to their spamming or phishing attacks. 11. Ransomware is a type of malware that blocks your access to your data or device, then threatens to either publish, permanently withhold, or destroy the data unless you pay a ransom. Ransomware Trojans use deceit to trick victims into activating the ransomware. 12. The cyber criminal maintains access to the device through a remote network connection, which they use to steal information or spy on a user.
  8. 13. Its purpose is to stop malicious programs from being detected, which enables malware to remain active on an infected computer for a longer period. 14. SMS Trojans infect mobile devices, usually Android, and either send expensive SMS messages to premium services owned by the cybercriminal, or intercept messages coming to and from your phone. This includes sending messages to premium-rate phone numbers, which increases the costs on a user’s phone bill. 15. This includes logging their keyboard actions, taking screenshots, accessing the applications they use, and tracking login data. 16. The trojanized file is a backdoor. Once on a target machine, it remains dormant for a two-week period and will then retrieve commands that allow it to transfer, execute, perform reconnaissance, reboot and halt system services. Communication occurs over http to predetermined URI's.
  9. Trojans often install additional malware that together can consume a large amount of computing resources. Sometimes, Trojans may overwhelm your computer and cause crashes or other failures. The infamous Blue Screen of Death is always a cause for concern. Many Trojans install additional malware. If you notice anything unfamiliar in your Windows Task Manager or macOS Activity Monitor, look it up — it might be malware. Some Trojans change your DNS settings or manipulate your browser to redirect you to malicious sites that can harvest your data or infect you with additional malware. As the Trojan installs new malware or makes other changes to your computer, you may see new icons on your desktop or in your taskbar. The same goes for browser toolbars or plugins that you didn’t install yourself — look out for these browser hijackers. Are you seeing more pop-ups than usual? A Trojan may have installed adware on your device. Trojans and other malware don’t want to be detected and removed — so they’ll try to turn off your antivirus software.
  10. Zeus is known mostly as banking trojan ZeuS eventually infected millions of computers — which is why it was used to create Gameover ZeuS, one of the most notorious botnets of all time.
  11. 4. Routinely hailed as one of the most damaging malware strains ever created, Emotet targeted corporate and individual victims alike through massive spam and phishing campaigns. The malware was used to create several botnets, which were then rented out on a malware-as-a-service (MaaS) model to other enterprising cybercriminals. Emotet was finally disrupted in 2021 via a coordinated global law enforcement effort. 5.
  12. 1. Trojans are often hosted on third-party app download sites. Get your software directly from the manufacturer or from official portals like the Apple App Store and Google Play — though these have been compromised by Trojans in the past, they’re much safer than other options. 2. Fraudulent emails are a popular vector for spreading Trojans. Don’t click attachments or links in emails that you aren’t expecting to receive. Even if the email looks legit, it may be spoofed by a cybercriminal. 3. Some Trojans spread through infected web ads. An ad blocker or private browser will prevent these and other ads from loading in your browser, preventing infected sites from giving you a Trojan. 4. Trojan creators often disguise their Trojans as free games and other seemingly useful apps. If you’re about to install something new, research it first and read user reviews. 5. Not all drive-by downloads are handled via malvertising. Some malware creators develop websites that can automatically install Trojans and other malware onto your device as soon as you visit. Avoiding unknown sites reduces your risk of downloading a Trojan. 6. A strong antivirus tool from a reputable provider will automatically keep Trojans off your device. Choose one that doubles as a malware removal tool that can detect and remove Trojans and other malware from your devices as well.