TROJAN HORSE DEFINITION

21 Oct, 2022 2271 Views
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Enterprise Xcitium Trojan Horse Definition

A Trojan Horse Definition is a malicious computer program that presents itself as legitimate software. Also called as a Trojan, it hides malware in a normal looking file.

The term Trojan horse is based on the deceptive wooden horse that led to the fall of the city of Troy in Ancient Greek mythology. The city of Troy had robust defenses that could not be broken/ penetrated by the enemy. The enemies then plotted and built a massive wooden horse that contained soldiers within its body. Troy’s gates were opened, and the horse was dragged into the city and then the gates were closed. At night, when the residents of Troy slept, the soldiers with the horse came out, opened the gates from within the city, and enabled their army to enter and destroy Troy.

The deceptive nature of this malware has led to it being defined as a Trojan horse.

HOW ARE TROJANS HORSES SPREAD

Cybercriminals employ social engineering to spread Trojans. Victims are tricked into clicking on malicious email attachments, which look harmless. On execution, the Trojan executes itself. Drive-by downloads are another popular way of spreading Trojans. In the drive-by download method, the Trojan program automatically gets downloaded onto the device/ computer without the victim granting permission for the download. In many cases, the victim never becomes aware of the presence of the Trojan. Trojans can spread to other devices / computers that are part of the same network.

WHAT DOES A TROJAN HORSE DO?

A Trojan horse carries a malicious payload which may include a backdoor or ransomware. The backdoor would allow the controller of the malware to gain unauthorized access to system resources and data on the computer. It could allow the downloading of more malware through the backdoor. Trojans help the controller steal users’ personal information such as passwords, banking credentials, and IP addresses). Cybercriminals use Trojans to carry out ransomware attacks, and the Trojans allow the controller to spy on the victim. Trojans can delete, block, copy, and modify data, and affect the performance of the devices/computers.

TYPES OF TROJANS

  • rootkit is a sophisticated type of Trojan that provides remote control of the victim’s device to the cyber criminal. Rootkits allow the victim’s device to be used as part of a botnet.
  • Trojan-Banker is designed to steal account data for online banking systems, credit and debit cards.
  • Trojan-Ransomware prevents the correct running of the device. It encrypts data and demands a ransom for the decrypting code.
  • Trojan-Spy Tprograms spy on the device when the victim is using your device/ computer
  • Trojan-FakeAV is dreaded malware that attempts to threaten the victim of the presence of a malware. It offers to remove malware for an amount, while in reality the victim’s system is not affected.

In addition, there are other types of Trojans such as Trojan-Dropper, and Trojan-IM (Instant message) programs.

Xcitium Advanced Endpoint Protection is the only antivirus solution that is able to block known Trojans, and automatically contain unknown, potentially malicious files within a sophisticated virtual container, till a verdict is reached.

EXAMPLES OF TROJAN HORSE MALWARE

Xcitium Following are most famous examples of Trojan horses

Bitfrost – This is a type of Remote Access Trojan, created by the hackers intending to infect Windows Clients by modifying components.

Tiny Banker – cyber thieves developed his to extract confidential banking/financial data, while their prime targets are banks and financial institutions.

Magic Lantern – The FBI created this to log and track the Keystrokes to aid with criminal surveillance

Zeus – This is the deadliest Trojan found to date. It is a crimeware toolkit that builds its own Trojan horse that includes polymorphic versions of Trojans, drive-by downloads, and form grabbing to extract critical and sensitive information of the victim.

PROTECT YOUR ENDPOINTS FOR FREE

RELATED SOURCES:

Endpoint Detection
Endpoint Detection and Response
What is a Trojan Virus?
How to Get Rid of Malware?
Rootkit Definition And Meaning
Ransomware Definition
Website Malware Scanner
Trojan Horse Computer Definition

XCITIUM PRODUCTS