Ethical Hacking 简明教程

Ethical Hacking - Trojan Attacks

特洛伊木马是非复制程序;它们不会通过附着到其他可执行代码来复制自己的代码。它们在未经计算机用户许可或不知情的情况下运行。

Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users.

特洛伊木马隐藏在正常进程中。然而,我们应该强调,特洛伊木马只在计算机用户的帮助下感染外部机器,例如点击来自陌生人的电子邮件附件文件、不扫描就插入 USB、打开不安全的 URL。

Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs.

木马有几种恶意功能 −

Trojans have several malicious functions −

  1. They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim.

  2. Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called Trojan-Banker.

  3. Trojans can use the victim computer to attack other systems using Denial of Services.

  4. Trojans can encrypt all your files and the hacker may thereafter demand money to decrypt them. These are Ransomware Trojans.

  5. They can use your phones to send SMS to third parties. These are called SMS Trojans.

Trojan Information

如果您发现了病毒并希望进一步调查其功能,那么我们建议您查看以下通常由防病毒供应商提供的病毒数据库。

If you have found a virus and want to investigate further regarding its function, then we will recommend that you have a look at the following virus databases, which are offered generally by antivirus vendors.

  1. Kaspersky Virus databasehttps://www.kaspersky.com

  2. F-securehttps://www.f-secure.com

  3. Symantec – Virus Encyclopediahttps://www.symantec.com

Quick Tips

  1. Install a good antivirus and keep it updated.

  2. Don’t open email attachments coming from unknown sources.

  3. Don’t accept invitation from unknown people in social media.

  4. Don’t open URLs sent by unknown people or URLs that are in weird form.