What Is a Trojan Horse? Trojan Virus and Malware ...
文章推薦指數: 80 %
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker ... Skiptocontent Skiptonavigation Skiptofooter TrojanHorseVirus ContactUs WhatIsaTrojanHorseVirus? ATrojanHorseVirusisatypeofmalwarethatdownloadsontoacomputerdisguisedasalegitimateprogram.Thedeliverymethodtypicallyseesanattackerusesocialengineeringtohidemaliciouscodewithinlegitimatesoftwaretotryandgainusers'systemaccesswiththeirsoftware. Asimplewaytoanswerthequestion"whatisTrojan"isitisatypeofmalwarethattypicallygetshiddenasanattachmentinanemailorafree-to-downloadfile,thentransfersontotheuser’sdevice.Oncedownloaded,themaliciouscodewillexecutethetasktheattackerdesigneditfor,suchasgainbackdooraccesstocorporatesystems,spyonusers’onlineactivity,orstealsensitivedata. IndicationsofaTrojanbeingactiveonadeviceincludeunusualactivitysuchascomputersettingsbeingchangedunexpectedly. HistoryoftheTrojanHorse TheoriginalstoryoftheTrojanhorsecanbefoundintheAeneidbyVirgilandtheOdysseybyHomer.Inthestory,theenemiesofthecityofTroywereabletogetinsidethecitygatesusingahorsetheypretendedwasagift.Thesoldiershidinsidethehugewoodenhorseandonceinside,theyclimbedoutandlettheothersoldiersin. Thereareafewelementsofthestorythatmaketheterm“Trojanhorse”anappropriatenameforthesetypesofcyberattacks: TheTrojanhorsewasauniquesolutiontothetarget’sdefenses.Intheoriginalstory,theattackershadlaidsiegetothecityfor10yearsandhadn’tsucceededindefeatingit.TheTrojanhorsegavethemtheaccesstheyhadbeenwantingforadecade.ATrojanvirus,similarly,canbeagoodwaytogetbehindanotherwisetightsetofdefenses. TheTrojanhorseappearedtobealegitimategift.Inasimilarvein,aTrojanviruslookslikelegitimatesoftware. ThesoldiersintheTrojanhorsecontrolledthecity’sdefensesystem.WithaTrojanvirus,themalwaretakescontrolofyourcomputer,potentiallyleavingitvulnerabletoother“invaders.” HowDoTrojansWork? Unlikecomputerviruses,a Trojanhorse cannotmanifestbyitself,soitneedsausertodownloadtheserversideoftheapplicationforittowork.Thismeanstheexecutable(.exe)fileshouldbeimplementedandtheprograminstalledfortheTrojantoattackadevice’ssystem. ATrojanvirusspreadsthroughlegitimate-lookingemailsandfilesattachedtoemails,whicharespammedtoreachtheinboxesofasmanypeopleaspossible.Whentheemailisopenedandthemaliciousattachmentisdownloaded,theTrojanserverwillinstallandautomaticallyruneverytimetheinfecteddeviceisturnedon. DevicescanalsobeinfectedbyaTrojanthroughsocialengineeringtactics,whichcybercriminalsusetocoerceusersintodownloadingamaliciousapplication.Themaliciousfilecouldbehiddeninbanneradvertisements,pop-upadvertisements,orlinksonwebsites. AcomputerinfectedbyTrojanmalwarecanalsospreadittoothercomputers.Acybercriminalturnsthedeviceintoazombiecomputer,whichmeanstheyhaveremotecontrolofitwithouttheuserknowing.Hackerscanthenusethezombiecomputertocontinuesharingmalwareacrossanetworkofdevices,knownasabotnet. Forexample,ausermightreceiveanemailfromsomeonetheyknow,whichincludesanattachmentthatalsolookslegitimate.However,theattachmentcontainsmaliciouscodethatexecutesandinstallstheTrojanontheirdevice.Theuseroftenwillnotknowanythinguntowardhasoccurred,astheircomputermaycontinuetoworknormallywithnosignsofithavingbeeninfected. Themalwarewillresideundetecteduntiltheusertakesacertainaction,suchasvisitingacertainwebsiteorbankingapp.Thiswillactivatethemaliciouscode,andtheTrojanwillcarryoutthehacker’sdesiredaction.DependingonthetypeofTrojanandhowitwascreated,themalwaremaydeleteitself,returntobeingdormant,orremainactiveonthedevice. Trojanscanalsoattackandinfectsmartphonesandtabletsusingastrandofmobilemalware.ThiscouldoccurthroughtheattackerredirectingtraffictoadeviceconnectedtoaWi-Finetworkandthenusingittolaunchcyberattacks. MostCommonTypesofTrojanMalware Therearemanytypesof Trojanhorseviruses thatcybercriminalsusetocarryoutdifferentactionsanddifferentattackmethods.ThemostcommontypesofTrojanusedinclude: BackdoorTrojan: AbackdoorTrojanenablesanattackertogainremoteaccesstoacomputerandtakecontrolofitusingabackdoor.Thisenablesthemaliciousactortodowhatevertheywantonthedevice,suchasdeletingfiles,rebootingthecomputer,stealingdata,oruploadingmalware.AbackdoorTrojanisfrequentlyusedtocreateabotnetthroughanetworkofzombiecomputers. BankerTrojan: AbankerTrojanisdesignedtotargetusers’bankingaccountsandfinancialinformation.Itattemptstostealaccountdataforcreditanddebitcards,e-paymentsystems,andonlinebankingsystems. Distributeddenial-of-service(DDoS)Trojan: TheseTrojanprogramscarryoutattacksthatoverloadanetworkwithtraffic.Itwillsendmultiplerequestsfromacomputeroragroupofcomputerstooverwhelmatargetwebaddressandcauseadenialofservice. DownloaderTrojan: AdownloaderTrojantargetsacomputerthathasalreadybeeninfectedbymalware,thendownloadsandinstallsmoremaliciousprogramstoit.ThiscouldbeadditionalTrojansorothertypesofmalwarelikeadware. ExploitTrojan: Anexploitmalwareprogramcontainscodeordatathattakesadvantageofspecificvulnerabilitieswithinanapplicationorcomputersystem.Thecybercriminalwilltargetusersthroughamethodlikeaphishingattack,thenusethecodeintheprogramtoexploitaknownvulnerability. FakeantivirusTrojan: AfakeantivirusTrojansimulatestheactionsoflegitimateantivirussoftware.TheTrojanisdesignedtodetectandremovethreatslikearegularantivirusprogram,thenextortmoneyfromusersforremovingthreatsthatmaybenonexistent. Game-thiefTrojan: Agame-thiefTrojanisspecificallydesignedtostealuseraccountinformationfrompeopleplayingonlinegames. Instantmessaging(IM)Trojan: ThistypeofTrojantargetsIMservicestostealusers’loginsandpasswords.IttargetspopularmessagingplatformssuchasAOLInstantMessenger,ICQ,MSNMessenger,Skype,andYahooPager. InfostealerTrojan: ThismalwarecaneitherbeusedtoinstallTrojansorpreventtheuserfromdetectingtheexistenceofamaliciousprogram.ThecomponentsofinfostealerTrojanscanmakeitdifficultforantivirussystemstodiscovertheminscans. MailfinderTrojan: AmailfinderTrojanaimstoharvestandstealemailaddressesthathavebeenstoredonacomputer. RansomTrojan: RansomTrojansseektoimpairacomputer’sperformanceorblockdataonthedevicesothattheusercannolongeraccessoruseit.Theattackerwillthenholdtheuserororganizationransomuntiltheypayaransomfeetoundothedevicedamageorunlocktheaffecteddata. RemoteaccessTrojan: SimilartoabackdoorTrojan,thisstrandofmalwaregivestheattackerfullcontrolofauser’scomputer.Thecybercriminalmaintainsaccesstothedevicethrougharemotenetworkconnection,whichtheyusetostealinformationorspyonauser. RootkitTrojan: Arootkitisatypeofmalwarethatconcealsitselfonauser’scomputer.Itspurposeistostopmaliciousprogramsfrombeingdetected,whichenablesmalwaretoremainactiveonaninfectedcomputerforalongerperiod. Shortmessageservice(SMS)Trojan: AnSMSTrojaninfectsmobiledevicesandiscapableofsendingandinterceptingtextmessages.Thisincludessendingmessagestopremium-ratephonenumbers,whichincreasesthecostsonauser’sphonebill. SpyTrojan: SpyTrojansaredesignedtositonauser’scomputerandspyontheiractivity.Thisincludesloggingtheirkeyboardactions,takingscreenshots,accessingtheapplicationstheyuse,andtrackinglogindata. SUNBURST:TheSUNBURSTtrojanviruswasreleasedonnumerousSolarWindsOrionPlatform.Victimswerecompromisedbytrojanizedversionsofalegitimate SolarWindsdigitallysignedfilenamed:SolarWinds.Orion.Core.BusinessLayer.dll.Thetrojanizedfileisabackdoor.Onceonatargetmachine,itremainsdormantforatwo-weekperiodandwillthenretrievecommandsthatallowittotransfer,execute,performreconnaissance,rebootandhaltsystemservices.CommunicationoccursoverhttptopredeterminedURI's. HowToRecognizeaTrojanVirus ATrojanhorseviruscanoftenremainonadeviceformonthswithouttheuserknowingtheircomputerhasbeeninfected.However,telltalesignsofthepresenceofaTrojanincludecomputersettingssuddenlychanging,alossincomputerperformance,orunusualactivitytakingplace.ThebestwaytorecognizeaTrojanistosearchadeviceusingaTrojanscannerormalware-removalsoftware. HowToProtectYourselffromTrojanViruses ATrojanhorseviruscanoftenremainonadeviceformonthswithouttheuserknowingtheircomputerhasbeeninfected.However,telltalesignsofthepresenceofaTrojanincludecomputersettingssuddenlychanging,alossincomputerperformance,orunusualactivitytakingplace.ThebestwaytorecognizeaTrojanistosearchadeviceusingaTrojanscannerormalware-removalsoftware. ExamplesofTrojanHorseVirusAttacks Trojanattackshavebeenresponsibleforcausingmajordamagebyinfectingcomputersandstealinguserdata.Well-knownexamplesofTrojansinclude: RakhniTrojan: TheRakhniTrojandeliversransomwareoracryptojackertool—whichenablesanattackertouseadevicetominecryptocurrency—toinfectdevices. TinyBanker: TinyBankerenableshackerstostealusers’financialdetails.Itwasdiscoveredwhenitinfectedatleast20U.S.banks. ZeusorZbot: ZeusisatoolkitthattargetsfinancialservicesandenableshackerstobuildtheirownTrojanmalware.Thesourcecodeusestechniqueslikeformgrabbingandkeystrokeloggingtostealusercredentialsandfinancialdetails. HowFortinetCanHelp? The Fortinetantivirusservices.leveragethepoweroftheFortiGuardLabsGlobalThreatIntelligencesystem.Inthespanofaminute,FortiGuardeliminates,onaverage,95,000 malware programs.FortiGuarddoesthisbyincorporatingknowledgeofthedifferenttypesofviruses withintheglobalthreatlandscape.Countermeasuresareengineeredtoneutralizeeachtypeofthreat,andthentheyareautomaticallyenactedbyFortiGuard,therebyprotectingthenetworksundertheFortiGuardumbrella. TheFortiGuardantivirusprotectionsystemcomeswithFortiGate,FortiSandbox,FortiMail,FortiWeb,FortiCache,andFortiClient. QuickLinks FreeProductDemo Explorekeyfeaturesandcapabilities,andexperienceuserinterfaces. ResourceCenter Downloadfromawiderangeofeducationalmaterialanddocuments. FreeTrials Testourproductsandsolutions. ContactSales Haveaquestion?We'reheretohelp. AlsoofInterestWhatisaKeylogger?WhatIsaWormVirus?Malwarevs.Virusvs.Worm:AnOverview ×
延伸文章資訊
- 1The Trojan Horse Myth And The True Story Behind It
According to ancient Greek history, the Trojan horse allowed the war-weary Greeks to enter the ci...
- 2YLCR2:The Trojan Horse - 文鶴網路書店
YLCR2:The Trojan Horse. ... Paris and Helen are hiding in the city of Troy. ... She tells the Gre...
- 3Trojan Horse - Wikipedia
The Trojan Horse refers to a wooden horse said to have been used by the Greeks, during the Trojan...
- 4Trojan horse (computing) - Wikipedia
In computing, a Trojan horse is any malware that misleads users of its true intent. The term is d...
- 5What Is a Trojan Horse? | Wonderopolis
Taking the Trojans by surprise in the middle of the night, the Greeks were able finally to conque...