Computer Virus: DR Sajeena S
Computer Virus: DR Sajeena S
Dr SAJEENA S.
COMPUTER VIRUS
• The term “Trojan” derives from the ancient Greek story about the
deceptive Trojan horse which led to the fall of the city of Troy. When it
comes to computer, a Trojan virus operates similarly – it hides within
seemingly harmless programs or tries to trick into downloading it. The
name was coined in a US Air Force report in 1974, which speculated on
hypothetical ways computers could be compromised.
• You will sometimes hear people refer to a "Trojan virus" or a "Trojan horse
virus," but these terms are slightly misleading. This is because, unlike viruses,
Trojans don’t self-replicate. Instead, a Trojan horse spreads by pretending to be
useful software or content while secretly containing malicious instructions. It is
more useful to think of “Trojan” as an umbrella term for malware delivery, which
hackers use for various threats.
TYPES OF TROJANS
• Trojans are classified according to the type of actions that they can perform
on your computer. Trojan horse virus examples include:
• Backdoor
• A backdoor Trojan gives malicious users remote control over the infected
computer. They enable the author to do anything they wish on the infected
computer – including sending, receiving, launching, and deleting files,
displaying data, and rebooting the computer. Backdoor Trojans are often
used to unite a group of victim computers to form a botnet or zombie
network that can be used for criminal purposes.
• Exploit
• Exploits are programs that contain data or code that takes advantage of a
vulnerability within application software that's running on your computer.
• Banker Trojan
• Trojan-Banker programs are designed to steal your account data for online banking systems,
e-payment systems, and credit or debit cards.
• Clampi Trojan
• Clampi – also known as Ligats and Ilomo – lies in wait for users to sign in to make a financial
transaction, such as accessing online banking or entering credit card information for an online
purchase. Clampi is sophisticated enough to hide behind firewalls and go undetected for long periods.
CRYXOS TROJAN
• Cryxos is commonly associated with so-called scareware or fake
support call requests. Typically, victims receive a pop-up
containing a message like "Your device has been hacked" or
"Your computer is infected". The user is directed to a phone
number for support. If the user calls the number, they are
pressured to pay for assistance. In some cases, the user may be
asked to give remote access of their machine to the “customer
service agent”, potentially leading to device hijack and data theft.
• DDoS Trojan
• These programs conduct
DDoS (Distributed Denial of Service) attacks against a
targeted web address. By sending multiple requests –
from your computer and several other infected
computers – the attack can overwhelm the target
address, leading to a denial of service.
• Downloader Trojan
• Trojan-Downloaders can download and install new
versions of malicious programs onto your computer –
including Trojans and adware.
Dropper Trojan
These programs are used by hackers to install Trojans or viruses – or to prevent the detection of malicious
programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
FakeAV Trojan
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from
you – in return for the detection and removal of threats, even though the threats they report are non-existent.
GameThief Trojan
This type of program steals user account information from online gamers.
• Geost Trojan
• Geost is an Android banking Trojan. It hides in malicious apps which are distributed through
unofficial webpages with randomly generated server hostnames. Victims typically encounter
these when they look for apps that are not available on Google Play. Once the app is
downloaded, it requests permissions which, when enabled, allow malware infection. Geost was
discovered after the gang behind it made security mistakes, allowing researchers to see right into
their operation and even identify some of the perpetrators.
• IM Trojan
• Trojan-IM programs steal your logins and passwords for instant messaging programs – such as
WhatsApp, Facebook Messenger, Skype, and many more. This type of Trojan can allow the
attacker to control chat sessions, sending the Trojan to anybody on your contact list. They can
also perform DDoS attacks using your computer.
• Mailfinder Trojan
• Ransom Trojan
• Abbreviated as RAT, Remote Access Trojans give hackers complete control over your computer
from a remote location. They can be used to steal information or spy on you. Once the host system
is compromised, the intruder may use it to distribute RATs to other vulnerable computers to
establish a botnet.
• Rootkit
• Rootkits are designed to conceal certain objects or activities in your system. Often their primary
purpose is to prevent malicious programs from being detected – to extend the period in which
programs can run on an infected computer.
• SMS Trojan
• These programs can cost you money by sending text messages from your mobile
device to premium rate phone numbers.
• Spy Trojan
• Trojan-Spy programs can spy on how you're using your computer – for example, by
tracking the data you enter via your keyboard, taking screenshots, or getting a list of
running applications.
• Qakbot Trojan
• Wacatac Trojan