Trojan horses wreak havoc on your system and can be difficult to identify and remove. This is because a Trojan (a.k.a. Trojan Horse) is often disguised as legitimate software. Many attackers create Trojans to attempt to gain access to your system. They are able to convince a prospective victim to execute or activate a Trojan because their disguise is so convincing.
Once a victim has loaded the Trojan onto their computer, cybercriminals take action. Here are some examples of Trojans and how they work:
- Remote Access - Remote Access Trojan's (a.k.a. RATs) provide the attacker with control over the victim's system. RATs are often hidden in games or programs that victims unwittingly open on their systems.
- Ransom - Another Trojan with the ability to modify data on your system. A Ransom Trojan aims to take over your system and reduce functionality or remove victim access to data. The attacker then demands money to restore access and unblock your data.
- Fake AV - Our least favorite Trojan, antivirus simulators! A fake antivirus Trojan is another type of Trojan designed for financial gain. A non-existent virus is "discovered" by the program and victims are typically given a monetary figure for removal.
- Backdoor - A backdoor Trojan allows attackers to remotely access your system. The attacker can send or receive files, delete files and even reboot your system. These Trojans tend to be more complex than others and can even band together with a group of victim computers to create a network which can be used for criminal purposes.
- Rootkit - A rootkit is designed to provide access to a victims computer while actively hiding its presence.
Though we have highlighted several types of Trojans, know that this is just a partial list of some of the more commonly used Trojans for consumers.
Hackers are actively building new malware daily so keeping yourself informed about programs that can potentially harm your computer is important!
Comments
0 comments
Article is closed for comments.