Top Menu

What are trojan horses

Trojan Horses are malware (malicious software) that pretend to have a beneficial effect to your computer system, but, in truth, only intends to cause more harm. This malware would open your computer to viruses and hackers alike. Unlike computer viruses, Trojans have no capacity to replicate. However, they still can cause serious damage on your computer. Some may say that Trojan horses are more dangerous because they are harder to identify and to avoid.

Etymology

The name Trojan is an allusion to the Trojan Horse that you can learn more about from he pages of Greek mythology and Greek history books. The Trojan Horse, according to literary and historical texts, was used by the Greeks to infiltrate Troy. The Greeks created a giant wooden horse and made it appear as their peace offering to the Trojans (people of Troy) before they go back to their homeland. As it turned, the whole thing was just ploy. The horse actually contains Greek soldiers inside. “Trojan horse” is an apt term for this malware, because just like its namesake, a Trojan malware hides its real purpose and would destroy your files or computer system without your being fully aware of it.

Classification of Trojan horses

Trojan horses can be categorized according to how they affect the computer program and the damages they can create.

* Remote Access Trojan

The Remote Access Trojan, or RAT, enables the cyber criminal who authored this malware to access your computer program, and worse, control the system. Usually, this malware hides in the games and videos that you download that it would be difficult to avoid the infiltration. People who spread this malware usually have the purpose of accessing your personal information and monitoring your web activity. There are also some who use this malware to find a host computer where they could save their games and other downloaded files. Among the popular Trojan horses are Black Orifices and Subseven. These malware have the ability to capture the videos from host computer and intercept passwords.

* Denial-of-Service Trojan

Commonly known as DoS Trojan, this malware has nothing to do with the host computer. Its attack is done by flooding the website or server with much network traffic that it would later cause the malfunctioning of your network connection. There is also another more sophisticated variant to this, the DDoS, or the Distributed Denial-of-Service. DDoS attacks happen when a multiple system (that is also infected with Trojans) are used to attack a single system.

* Security Software Disabler

This Trojan has the ability to stop the installed anti-virus software and firewall from functioning. The aim of this Trojan horse is to weaken the protection of your computer and open it to viruses and other malware.

* Keylogger

This is an extremely damaging Trojan that is commonly used by cyber criminals. Although the damage that this Trojan creates is not on the infected computer itself, this malware is still considered very malicious, because it enables hackers to access the important files and passwords from the system. The target of the attack is mostly e-banking services and online stores.

* Downloader Trojan

This malware exhibits its damaging effects once your computer is connected to the Internet. The malware facilitates the automatic installation of harmful software such as malware and spyware without you knowing it.

Preventing Trojan infection

As there are various types of Trojan horses, there are also various ways to deal with them. The basic step that you could do is to delete the infected file. It is important that you install anti-spyware and anti-virus on your computer so you can detect any Trojan attack. After the installation, you should also update your computer protection software.

, ,