2. • Definition
• Types of Trojan Horse
• Types of Trojan Horse Payloads
• Process
• How To Avoid From Be Infected
• How To Remove
• Conclusion
• Reference
3. A computer virus is a computer program that
can copy itself and infect a computer
without permission or knowledge of the user.
A Trojan Horse is a program that installs
malicious software while under the guise of
doing something else
4. One of the earliest Trojan horse viruses was
detected in the 1980s, when several
computers were affected. As it was earlier
mentioned Trojan horse viruses are created
in order to steal useful information such as
passwords. They are developed by hackers,
who, after stealing data, can use the
information for various purposes, including
blackmailing. Some of the first Trojan horse
viruses were able to infectWindows32 files,
but since then these programs evolved, and
today they can cause even more harm.
5. A Trojan may give a hacker remote access to a targeted
computer system. Operations that could be performed by a
hacker on a targeted computer system may include:
Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service
attacks)
Electronic money theft
Data theft (e.g. retrieving passwords or credit card
information)
Installation of software, including third-party malware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
6. There are two common types of Trojan horses:
1.One is ordinary software that has been corrupted by
hacker . A
cracker inserts malicious code into the program that
executes
while the program is used.
Example : Implementations of weather alerting
programs,
computer clock setting software and p2p file sharing
utilities.
2.Standalone program that masquerades as something
else,
like a game or image file, in order to trick the user into
running
the program.
7. There are two types of Trojan Horse :
-Time Bomb and Logic Bomb
-Droppers
8. Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Y3K Remote Administration Tool (by
Konstantinos & Evangelos Tselentis)
Back Orifice (Sir Dystic)
Beast
Zeus
The Blackhole exploit kit
Flashback Trojan (Trojan.BackDoor.Flashback)
9. Time Bomb activate on particular dates and
times.
Logic Bomb activate on certain condition met
by computer.
Droppers perform two tasks at once. A
dropper form a legitimate but also installs a
computer virus or a computer worm on a
system or disk at the same time.
10. Do not download anything from the stranger
website.
Do not surf to the unknown website.
Do not open the unexpected attachments on
emails
11. Use the following tools :
The program is called smitfraudfix
http://siri.geekstogo.com/SmitfraudFix.php
Just follow the instruction there
Download Grisoft Avg 7.5 Anti-Virus, Anti-
Malware . Free edition
http://free.grisoft.com/doc/5390/lng/us/...
14. We need to be careful when download
something. We also need an anti-virus to
protect our computer from be infected by
virus.
We need to be a smart user because this can
help us from be tricked with nice thing but
behind the scenes it infects our computer
with a Trojan or Worm.