What Is Trojan Virus ? How To Infect PC.

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
    These actions can include:
  • Deleting data
  • Blocking data
  • Modifying data
  • Copying data
  • Disrupting the performance of computers or computer networks
     Dissimilar to PC Virus and worms, Trojans are not ready to self-reproduce.

     
Malware techno

  Uses of a Trojan horse
  • When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
  • Give the attacker backdoor control over the computing device.
  • Record keyboard strokes to steal the user's account data and browsing history.
  • Download and install a virus or worm to exploit a vulnerability in another program.
  • Install ransomware to encrypt the user's data and extort money for the decryption key.
  • Activate the computing device's camera and recording capabilities.
  • Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
  • Legally capture information relevant to a criminal investigation for law enforcement.  
      Trojans are Classified according to the type of action that can perform in PC.
  1. Backdoor : A backdoor, in computing, is a method of bypassing authentication in a piece of software or computer system which can be used for accessing the software without being detected.Backdoor is a Subcategory of Trojans. and Trojan of Category of Malware .Web server backdoors are used for a number of malicious activities, including:
  • Data theft
  • Website defacing
  • Server hijacking
  • The launching of distributed denial of service (DDoS) attacks
  • Infecting website visitors (watering hole attacks)
  • Advanced persistent threat (APT) assaults.

No comments: