Trojan Horses: How It Really Works (+Examples)

Unknown Facts About Trojan Horses

 

The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors.
At night, after most Trojans were asleep, the warriors burst out of the horse, opened the city gates, and allowed a sizeable force to enter and take over the city.
Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games.
Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
The Trojan horse concept is flexible. It can cause immediate damage, provide remote access to the system, or access through a back door. It can also perform actions as instructed remotely, such as “send me the password file once per week.” This tendency of malware to send data back to the cybercriminal highlights the need to monitor outbound traffic for attack indicators.
Custom-written Trojan horses, such as those with a specific target, are difficult to detect.
 

Trojan Horse Classification

Trojan horses are usually classified according to the damage that they cause, or the manner in which they breach a system, as shown in the figure.
Type of Trojan Horse Description
Remote-access Enables unauthorized remote access.
Data-sending Provides the threat actor with sensitive data, such as passwords.
Destructive Corrupts or deletes files.
Proxy Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.
FTP Enables unauthorized file transfer services on end devices.
Security software disabler Stops antivirus programs or firewalls from functioning.
Denial of Service (DoS) Slows or halts network activity.
Keylogger Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.
PEOPLE ALSO READ:  Understanding IP Vulnerabilities In Networking

To Get Email Updates when we post new contents, Click Here.

Loading

Related Posts

Spiritual Gifts: Identification And UsageSpiritual Gifts: Identification And Usage
You Will Be Addressed The Way You...
OPENING PRAYER: Father, please help me not to disappoint You...
Read more
RCCG SOD Year One. Demon On Assignment. Part One.RCCG SOD Year One. Demon On Assignment. Part One.
RCCG SOD Year One. Demon On Assignment....
RCCG SOD Year One. Demon On Assignment. Part One.  
PEOPLE ALSO READ:  System Security Operations: Highlighting The Major Threats To Security Operations
  Devil on...
Read more
Day 2: 2023 MFM 70 Days Fasting And PrayersDay 2: 2023 MFM 70 Days Fasting And Prayers
Day 6: 2023 MFM 70 Days Fasting...
  MFM 70 Fasting Devotional Songs Praise and WorshipPrayers of Praise and...
Read more
Key Tools For Links And Tracking For Affiliate MarketersKey Tools For Links And Tracking For Affiliate Marketers
Links And Tracking For Affiliate Marketers: The...
  This section is all about tools that help you with...
Read more
The Mighty Samson. RCCG Sunday School Teachers.The Mighty Samson. RCCG Sunday School Teachers.
Speaking In Unknown Tongues. RCCG Sunday School...
  Previous Knowledge: The Teacher should allow one of the students...
Read more
The Shepherd and The Sheep. RCCG Sunday School Students ManualThe Shepherd and The Sheep. RCCG Sunday School Students Manual
The Shepherd and The Sheep. RCCG Sunday...
The Shepherd and The Sheep. RCCG Sunday School Students' Manual     BIBLE...
Read more
12 Common Mistakes When Building E-Commerce Website12 Common Mistakes When Building E-Commerce Website
12 Common Mistakes When Building An E-Commerce...
    In my previous articles, I have looked at some of...
Read more
domain authority 301domain authority 301
Domain Authority 301: Rebranding Your Website
  As a business owner, you must make sure your website...
Read more
CRMNuggets Whatsapp Channel
truehost

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Enable Notifications OK No thanks