Part B - Micro-Project Proposal Title - Study Any Trojan Attack. Identify The Trojan Attack
Part B - Micro-Project Proposal Title - Study Any Trojan Attack. Identify The Trojan Attack
1.0 Rationale
In our computer world, a Trojan Horse is a malicious security breaking program that is
disguised as something benign. For example, you download what appears to be a movie or
music file, but when you click on it, you unleash a dangerous program (Trojan horse program
is downloaded on your PC) that erases your disk, sends your credit card numbers and
passwords to a stranger, or lets that stranger hijack your computer to commit illegal attacks.
Nowadays there are so many Trojan Horses .These server-Trojans are installed on
somebody’s pc and person having that client-Trojan can access & control somebody’s pc
without his knowing. This may be dangerous. So computer users should know about Trojan
viruses and their potential harms to private data. Users should take care while installing
unknown software’s from internet. So this micro-project is totally based on such Trojan Horse
attacks and this research will be helpful to prevent such cyber-attacks.
The use of financial and banking Trojans against organizations and consumers alike is a
problem which is steadily growing, with frequent attacks being recorded against enterprise
organizations.
Researchers from Kaspersky Labs revealed some interesting data relating to the use of
financial malware, which was detected in close to 900,000 attacks against users in 2018 -- an
increase of 16 percent in comparison to 767,000 attacks in 2017.
Banking Trojans, including BackSwap, Zeus, Emotet, and Gozi, focus on compromising
systems in order to create a persistent backdoor.
This backdoor is used to connect to a command-and-control (C2) server for the purposes
of data theft, including online account credentials and keylogs, potentially leading to bank
accounts being compromised and identity theft.
Zbot and Gozi are the most widely-used Trojans -- accounting for over 26 percent and 20
percent of attacked users respectively -- alongside SpyEye, which is attributed to 15.6 percent
of campaigns.
The cyber security firm said that the RTM banking Trojan (.PDF) has also been detected in
many of the recent attacks on record, leading to a spike in financial malware activity across
the globe.
We have planned the micro-project on ‘Study any Trojan attack and Identify the Trojan
attack’ under the guidance of subject teacher. Then we have researched on different types of
Trojan Horses and their working for hacking purpose. We have studied how hackers uses
Trojan to access Computers and steal confidential information. Then we have collected some
samples of Trojan Horse and tested them against different antiviruses.
We have studied to detect and remove Trojan from computer. Also studied how to
prevent Trojan Horse attacks so that hackers will not damage or steal private data from any
organization or company. After research, we have prepared micro-project report and
included all the related information in this report.
5.0 Actual Resources Used
Because a RAT enables administrative control, it makes it possible for the intruder to
do just about anything on the targeted computer, including:
Destructive Trojan
Proxy Trojan
A proxy Trojan is a virus which hijacks and turns the host computer into a proxy
server, part of a botnet, from which an attacker can stage anonymous activities and
attacks.
The whole point of a proxy Trojan is to hide the attacker, making it harder to trace
the true origin of an attack since the attacks will look like they are coming from random
and multiple directions because of the proxy bots.
Security Software Disabler Trojan
A type of Trojan horse designed stop or kill security programs such as an
antivirus program or firewall without the user knowing. This Trojan type is
normally combined with another type of Trojan as a payload.
FTP Trojan
An FTP Trojan installs an FTP server on the victim’s machine allowing the
attacker to gain access to sensitive data through the FTP Protocol. The Trojan opens
port 21 and makes it accessible to the attacker or a group of individuals. Some
password attacks can also be employed where only the attacker gains access to the
system. The system tries to download and upload files from the victim system. The
types of information affected include: Credit card information All types of
username and password information Confidential data Email addresses to
propagate Using the victim’s computer as a source for propagating other
attacks Securing a Computer Against Trojan Attack Anti-virus gateway protection
can be employed to detect Trojans incoming through HTTP, email or FTP.
We have studied:
1. To detect a computer infected by Trojan viruses.
2. To remove Trojan viruses securely from computer.
3. To prevent Trojan attacks.
4. Different types of Trojan viruses and their uses in hacking.
8.0 Applications of This Micro-project
9.0 Reference
https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html
https://enterprise.comodo.com/example-of-a-trojan-horse.php
https://www.scribd.com/doc/106785842/Trojan-Horse-Case-Study
https://www.ikarussecurity.com/en/private-customers/download-test-viruses/