Trojan Horses: How It Really Works (+Examples)

Unknown Facts About Trojan Horses

 

The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors.
At night, after most Trojans were asleep, the warriors burst out of the horse, opened the city gates, and allowed a sizeable force to enter and take over the city.
Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games.
Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
The Trojan horse concept is flexible. It can cause immediate damage, provide remote access to the system, or access through a back door. It can also perform actions as instructed remotely, such as “send me the password file once per week.” This tendency of malware to send data back to the cybercriminal highlights the need to monitor outbound traffic for attack indicators.
Custom-written Trojan horses, such as those with a specific target, are difficult to detect.
 

Trojan Horse Classification

Trojan horses are usually classified according to the damage that they cause, or the manner in which they breach a system, as shown in the figure.
Type of Trojan Horse Description
Remote-access Enables unauthorized remote access.
Data-sending Provides the threat actor with sensitive data, such as passwords.
Destructive Corrupts or deletes files.
Proxy Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.
FTP Enables unauthorized file transfer services on end devices.
Security software disabler Stops antivirus programs or firewalls from functioning.
Denial of Service (DoS) Slows or halts network activity.
Keylogger Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.
PEOPLE ALSO READ:  Analysing Denial Of Service Attack In Cybersecurity

To Get Email Updates when we post new contents, Click Here.

Loading

Related Posts

image of Jesus and some disciples in a boatimage of Jesus and some disciples in a boat
Day 50: 2023 MFM 70 Days Fasting...
  Devotional Songs Pages 4-12) Praise and Worship  Prayers Of  Praise and Thanksgiving...
Read more
The Preeminence Of Love. AG Sunday School TeachersThe Preeminence Of Love. AG Sunday School Teachers
The Preeminence Of Love. AG Sunday School...
The Preeminence Of Love. AG Sunday School Teachers  
PEOPLE ALSO READ:  Insight Into Packet Forwarding Decision Process
Memory Verse: Luke...
Read more
Abuse Of Phones And ICT By The Youth. RCCG House Fellowship ManualAbuse Of Phones And ICT By The Youth. RCCG House Fellowship Manual
Abuse Of Phones And ICT By The...
OPENING PRAYER: Father, please don’t let us be lured into eternal...
Read more
Analysing Network Security Topology In CybersecurityAnalysing Network Security Topology In Cybersecurity
Analysing Network Security Topology In Cybersecurity
“All networks are targets” is a common adage used to...
Read more
Self-Cleansing. RCCG Sunday School Teachers 29/07/2023Self-Cleansing. RCCG Sunday School Teachers 29/07/2023
Self-Cleansing. RCCG Sunday School Teachers 29/07/2023
  OPENING PRAYER: Almighty Father, please teach me how to cleanse myself daily for...
Read more
The Christian Entrepreneur. RCCG Sunday School Manual.The Christian Entrepreneur. RCCG Sunday School Manual.
The Christian Entrepreneur. RCCG Sunday School Manual.
    Memory Verse: "Do you see a man who excels in...
Read more
robeert greene 48 laws of powerrobeert greene 48 laws of power
Law 1: Robert Greene 48 Laws Of...
Law 1: Robert Greene 48 Laws Of Power Law 1: Never...
Read more
RCCG SOD Year Five: The Disciple's AnointingRCCG SOD Year Five: The Disciple's Anointing
The Disciple's Anointing. RCCG SOD Year Five.
  THE DISCIPLE'S ANOINTING     We have learnt about different kinds of anointing,...
Read more
CRMNuggets Whatsapp Channel
truehost

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Enable Notifications OK No thanks