Posts Tagged Trojan Virus

What Is A Trojan And How To Protect Against It?

A Trojan Virus or Trojan Horse virus is a type of malware that impersonates legitimate files or programs for conceding its true contents. The payload hidden in the Trojan Virus remains unknown to the target user and can act as delivery vehicle for a variety of threats. Unlike normal viruses, a Trojan virus is capable of replicating itself.

Types Of Trojan Virus

Common types of Trojan Virus are:

  • Backdoor Trojans – This type of Trojan Virus allows hackers to remotely access and control a computer for uploading, downloading, or executing files.
  • Exploit Trojans –These Trojans inject a machine with code that is specifically designed to take advantage of vulnerability inherent to a specific piece of software.
  • Rootkit Trojans –These Trojans prevent the discovery of malware already infecting a system so that it can cause maximum damage.
  • Banker Trojans –This type of Trojan Virus specifically targets personal information used for banking and other online transactions.
  • Distributed Denial of Service (DDoS) Trojans – These Trojans are programmed to execute DDoS attacks, where a network or machine is disabled by a flood of requests originating from different sources.
  • Downloader Trojans –These are files written to download additional malware, often including more Trojans, onto an infected system.

Detecting A Trojan Virus:

Some common telltale signs of infection by a Trojan Virus are:

  • Poor Device Performance
  • Strange Device Behavior
  • Pop-Up & Spam Interruptions

If the system exhibits any of these behaviors, it is possible that system is infected with a Trojan Virus. Here are some ways to detect the Trojan:

  • Search the system for programs or applications you don’t remember installing.
  • If you find any unrecognized file names, search online for these file names to check if they are recognized Trojans
  • Scan the system with antivirus and antimalware software to see if it detects a malicious file.

Defending Against Trojan Virus

As preventive measures, stick to following practices to defend your system against Trojan Virus:

  • Install an effective internet security solution
  • Refrain from downloading or installing software from a source you don’t trust
  • Never open an attachment or run a program sent in an email from an unrecognized address
  • Keep all software on your computer up to date with the latest patches for avoiding vulnerabilities
  • Make sure a Trojan antivirus is installed and running on your system
  • Run regular system scans

For more information on Trojan Virus, contact Centex Technologies at (254) 213 – 4740.

, , , ,

No Comments

Reasons Why Trojan Virus Is Dangerous

October 10, 2015

Trojan is a malicious software program designed to carry out unauthorized actions on a computer. These may include deleting system files, modifying, blocking or copying data and disrupting the computer’s performance on various networks. Although Trojans do not have the ability to replicate themselves like a virus, they can allow installation of viruses in the infected computer.

How Trojan Infects A Computer?

Trojan viruses can infect a computer through any of the following ways:

  • Email Attachments: Trojans can be sent in a disguised form through email attachments. The hacker may send emails claiming to be from credible organizations that compel the users to download attachments.
  • Game Downloads: The virus can infect a system through free game downloads, specifically from unauthorized sources.
  • Web Browser Exploits: Trojan viruses can also enter a user’s computer through security vulnerabilities in the web browser.
  • Messaging Clients: The hacker may send a spam link or malicious code through instant messaging platforms which, when downloaded, infect the device with a Trojan.

Consequences Of Trojan Virus

Here are some of the reasons why Trojan virus can be dangerous:

  • Steal Identity: Certain form of Trojans jot down whichever key you strike on your keyboard. Thus, they are able to steal your username and password for different websites, known as an identity theft. When the hacker breaches your account, he can get access to your contacts and send them malicious URLs to infect their system as well.
  • Manipulate Requests: Trojans can also be used to execute a man-in-the-browser attack. When an individual performs any financial operation, the virus may manipulate the amount and account details once the transaction has been confirmed.
  • Difficult To Detect: Unlike other viruses and worms, Trojans are much difficult to detect and remove from the computer. This is because they are not active unless you are doing something important on your computer, such as logging into an account or transferring funds from your bank account.
  • Subjugate The Computer: Trojan allows the cybercriminal to take complete control over the infected computer. Hence, they are able to turn on their web cam, disable the mouse or keyboard and even boot up the system.
  • Launch Another Attack: DDoS attacks can also be carried out through some types of Trojan viruses. The hacker may install other malicious software, damage the system or steal important information stored in the computer.

It is important that you keep your anti-virus software updated to detect any Trojan infection and prevent the hackers from accessing your computer.

,

No Comments