Ethical Hacking 简明教程

Ethical Hacking - Trojan Attacks

Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users.

Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs.

Trojans have several malicious functions −

  1. They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim.

  2. Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called Trojan-Banker.

  3. Trojans can use the victim computer to attack other systems using Denial of Services.

  4. Trojans can encrypt all your files and the hacker may thereafter demand money to decrypt them. These are Ransomware Trojans.

  5. They can use your phones to send SMS to third parties. These are called SMS Trojans.

Trojan Information

If you have found a virus and want to investigate further regarding its function, then we will recommend that you have a look at the following virus databases, which are offered generally by antivirus vendors.

  1. Kaspersky Virus databasehttps://www.kaspersky.com

  2. F-securehttps://www.f-secure.com

  3. Symantec – Virus Encyclopediahttps://www.symantec.com

Quick Tips

  1. Install a good antivirus and keep it updated.

  2. Don’t open email attachments coming from unknown sources.

  3. Don’t accept invitation from unknown people in social media.

  4. Don’t open URLs sent by unknown people or URLs that are in weird form.