SlideShare a Scribd company logo
Trojan
A malware which misleads users of its true intent.
The term is derived from the Ancient Greek story of
Trojan Horse that led to the fall of the city of Troy
Trojans are generally spread by –
- a user is duped into executing
an email attachment disguised to appear not suspicious,
(e.g., a routine form to be filled in)
- by clicking on some fake advertisement
Their payload act as a backdoor, contacting a controller
which can then have unauthorized access to the affected
computer.
Trojan
Unlike computer viruses and worms, trojans generally do not attempt to inject
themselves into other files
Trojan viruses, in this way, may require interaction with a malicious controller
(not necessarily distributing the trojan) to fulfill their purpose. It is possible for
those involved with trojans to scan computers on a network to locate any with
a trojan installed, which the hacker can then control, creating a so
called botnet.
A botnet is a number of Internet-connected devices, each of which is running
one or more bots. Botnets can be used to perform Distributed Denial-of-
Service (DDoS) attacks, steal data, send spam, and allow the attacker to
access the device and its connection. The owner can control the botnet using
command and control (C&C) software
Trojans may allow an attacker to access users' personal information such as
banking information, passwords, or personal identity.
It can also delete a user's files or infect other devices connected to the
network. Ransomware attacks are often carried out using a trojan.
Some trojans take advantage of a security flaw in older versions
of Internet Explorer and Google Chrome to use the host computer
as an anonymizer proxy to effectively hide Internet usage,
enabling the controller to use the Internet for illegal purposes
while all potentially incriminating evidence indicates the infected
computer or its IP address.
An anonymizer proxy is a tool that attempts to make activity on
the Internet untraceable. It is a proxy server computer that acts as an
intermediary and privacy shield between a client computer and the rest of the
Internet. It accesses the Internet on the user's behalf, protecting personal
information of the user by hiding the client computer's identifying information
According to a survey conducted by BitDefender from January to
June 2009, "trojan-type malware is on the rise, accounting for
83% of the global malware detected in the world."
Trojans have a relationship with worms, as they spread with the
help given by worms and travel across the internet with them.
The host's computer may or may not show the internet history of
the sites viewed using the computer as a proxy. The first
generation of anonymizer trojan horses tended to leave their
tracks in the page view histories of the host computer. Later
generations of the trojan tend to "cover" their tracks more
efficiently.
Examples of Trojan Horse Virus Infection
Trojan
Infection
Exploit
Backdoor
Rootkit
Trojan
Banker
Trojan
DDoS
Trojan
Downloa
der
Trojan
Dropper
Remote Access Trojan
Data Sending Trojan
Destructive Trojan
Proxy Trojan
FTP Trojan
Security Software Disabler Trojan
DoS Attack Trojan
Types of Trojan
Victim Attacker
TCP
Trojan Server Trojan Client
Components of Trojan Horse
Zeus
Zeus is a Trojan horse made to infect Windows computers so that
it will perform various criminal tasks.
The most common of these tasks are usually man-in-the-browser
keylogging and form grabbing.
The majority of computers were infected either through drive-by
downloads or phishing scams.
First identified in 2009, it managed to compromise thousands of
FTP accounts and computers from large multinational
corporations and banks such as Amazon, Oracle, Bank of America,
Cisco, etc.
Controllers of the Zeus botnet used it to steal the login credentials
of social network, email and banking accounts.
NetBus
Back Orifice XP
Sub Seven (Sub7)
Beast
CryptoLocker
CryptoLocker is a form of Trojan horse ransomware targeted at
computers running Windows. It uses several methods to spread
itself, such as email, and once a computer is infected, it will
proceed to encrypt certain files on the hard drive and any mounted
storage connected to it with RSA public key cryptography.
While it is easy enough to remove the malware from the computer,
the files will still remain encrypted. The only way to unlock the files
is to pay a ransom by a deadline. If the deadline is not met, the
ransom will increase significantly or the decryption keys deleted.
The ransom usually amount to $400 in prepaid cash or bitcoin.
Ids 007 trojan horse
Flashback
• One of the few Mac malware
• It showed that Macs are not immune.
• The Trojan was first discovered in 2011 by antivirus company
Intego as a fake Flash install.
• In its newer incarnation, a user simply needs to have Java
enabled. It propagates itself by using compromised websites
containing JavaScript code that will download the payload. Once
installed, the Mac becomes part of a botnet of other infected
Macs.
Ad

Recommended

Ids 006 computer worms
Ids 006 computer worms
jyoti_lakhani
 
Internet Security
Internet Security
Manoj Sahu
 
5 worms and other malware
5 worms and other malware
drewz lin
 
Cybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer Virus
Computer Virus
izzul
 
Computer virus
Computer virus
Rohit Nayak
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
ainizbahari97
 
Presentation on virus
Presentation on virus
Protik Roy
 
Internet worm-case-study
Internet worm-case-study
Ian Sommerville
 
computer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Trojan horse
Trojan horse
Gaurang Rathod
 
Virus
Virus
Protik Roy
 
virus,worms & analysis
virus,worms & analysis
Priyatham Galisetty
 
Virus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Computer virus
Computer virus
Dark Side
 
Computer Worms
Computer Worms
sadique_ghitm
 
Computer virus & its cure
Computer virus & its cure
Tamim Ahmed
 
Computer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer virus
Computer virus
Manjula Pradeep Gunathilake
 
Computer virus
Computer virus
Rahul Baghla
 
Computer Virus
Computer Virus
Aritra Das
 
Presentation Slide: Computer Virus
Presentation Slide: Computer Virus
Yo Maruf
 
Computer Virus
Computer Virus
Rajah Anuragavan
 
Computer viruses
Computer viruses
Imran Khan
 
presentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Virus soran university
Virus soran university
Rebaz Hamad
 
Trojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Malware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Torjan horse virus
Torjan horse virus
sumitra22
 
trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 

More Related Content

What's hot (20)

Internet worm-case-study
Internet worm-case-study
Ian Sommerville
 
computer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Trojan horse
Trojan horse
Gaurang Rathod
 
Virus
Virus
Protik Roy
 
virus,worms & analysis
virus,worms & analysis
Priyatham Galisetty
 
Virus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Computer virus
Computer virus
Dark Side
 
Computer Worms
Computer Worms
sadique_ghitm
 
Computer virus & its cure
Computer virus & its cure
Tamim Ahmed
 
Computer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer virus
Computer virus
Manjula Pradeep Gunathilake
 
Computer virus
Computer virus
Rahul Baghla
 
Computer Virus
Computer Virus
Aritra Das
 
Presentation Slide: Computer Virus
Presentation Slide: Computer Virus
Yo Maruf
 
Computer Virus
Computer Virus
Rajah Anuragavan
 
Computer viruses
Computer viruses
Imran Khan
 
presentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Virus soran university
Virus soran university
Rebaz Hamad
 
Trojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Malware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Internet worm-case-study
Internet worm-case-study
Ian Sommerville
 
computer vipin kumar ppt
computer vipin kumar ppt
vipinkumar940
 
Virus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Computer virus
Computer virus
Dark Side
 
Computer virus & its cure
Computer virus & its cure
Tamim Ahmed
 
Computer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Computer Virus
Computer Virus
Aritra Das
 
Presentation Slide: Computer Virus
Presentation Slide: Computer Virus
Yo Maruf
 
Computer viruses
Computer viruses
Imran Khan
 
presentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Virus soran university
Virus soran university
Rebaz Hamad
 
Trojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Malware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 

Similar to Ids 007 trojan horse (20)

Torjan horse virus
Torjan horse virus
sumitra22
 
trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 
Information security
Information security
JAMEEL AHMED KHOSO
 
The trojan horse virus
The trojan horse virus
HTS Hosting
 
Trojan backdoors
Trojan backdoors
seth edmond
 
Security threats
Security threats
Qamar Farooq
 
Trojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Ethical hacking trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Ransomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
 
attack vector in cyber security access to a computer
attack vector in cyber security access to a computer
premalathav6
 
Computer virus
Computer virus
sajeena81
 
Computer crimes
Computer crimes
Muniba Bukhari
 
Dickmaster
Dickmaster
DickMaster1
 
It act seminar
It act seminar
Akshay Sharma
 
Virus trojanworm
Virus trojanworm
JenMorri
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Trojan Backdoors
Trojan Backdoors
JauwadSyed
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Torjan horse virus
Torjan horse virus
sumitra22
 
trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 
The trojan horse virus
The trojan horse virus
HTS Hosting
 
Trojan backdoors
Trojan backdoors
seth edmond
 
Trojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Ethical hacking trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Ransomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
 
attack vector in cyber security access to a computer
attack vector in cyber security access to a computer
premalathav6
 
Computer virus
Computer virus
sajeena81
 
Virus trojanworm
Virus trojanworm
JenMorri
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Trojan Backdoors
Trojan Backdoors
JauwadSyed
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Ad

More from jyoti_lakhani (20)

CG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsx
jyoti_lakhani
 
Projections.pptx
Projections.pptx
jyoti_lakhani
 
CG04 Color Models.ppsx
CG04 Color Models.ppsx
jyoti_lakhani
 
CG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsx
jyoti_lakhani
 
CG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptx
jyoti_lakhani
 
CG01 introduction.ppsx
CG01 introduction.ppsx
jyoti_lakhani
 
Doubly linked list
Doubly linked list
jyoti_lakhani
 
Double ended queue
Double ended queue
jyoti_lakhani
 
Tree terminology and introduction to binary tree
Tree terminology and introduction to binary tree
jyoti_lakhani
 
Priority queue
Priority queue
jyoti_lakhani
 
Ds006 linked list- delete from front
Ds006 linked list- delete from front
jyoti_lakhani
 
Ds06 linked list- insert a node after a given node
Ds06 linked list- insert a node after a given node
jyoti_lakhani
 
Ds06 linked list- insert a node at end
Ds06 linked list- insert a node at end
jyoti_lakhani
 
Ds06 linked list- insert a node at beginning
Ds06 linked list- insert a node at beginning
jyoti_lakhani
 
Ds06 linked list- intro and create a node
Ds06 linked list- intro and create a node
jyoti_lakhani
 
Ds04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhani
jyoti_lakhani
 
Ds03 part i algorithms by jyoti lakhani
Ds03 part i algorithms by jyoti lakhani
jyoti_lakhani
 
Ds03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhani
jyoti_lakhani
 
Ds02 flow chart and pseudo code
Ds02 flow chart and pseudo code
jyoti_lakhani
 
Ds01 data structure introduction - by jyoti lakhani
Ds01 data structure introduction - by jyoti lakhani
jyoti_lakhani
 
CG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsx
jyoti_lakhani
 
CG04 Color Models.ppsx
CG04 Color Models.ppsx
jyoti_lakhani
 
CG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsx
jyoti_lakhani
 
CG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptx
jyoti_lakhani
 
CG01 introduction.ppsx
CG01 introduction.ppsx
jyoti_lakhani
 
Tree terminology and introduction to binary tree
Tree terminology and introduction to binary tree
jyoti_lakhani
 
Ds006 linked list- delete from front
Ds006 linked list- delete from front
jyoti_lakhani
 
Ds06 linked list- insert a node after a given node
Ds06 linked list- insert a node after a given node
jyoti_lakhani
 
Ds06 linked list- insert a node at end
Ds06 linked list- insert a node at end
jyoti_lakhani
 
Ds06 linked list- insert a node at beginning
Ds06 linked list- insert a node at beginning
jyoti_lakhani
 
Ds06 linked list- intro and create a node
Ds06 linked list- intro and create a node
jyoti_lakhani
 
Ds04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhani
jyoti_lakhani
 
Ds03 part i algorithms by jyoti lakhani
Ds03 part i algorithms by jyoti lakhani
jyoti_lakhani
 
Ds03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhani
jyoti_lakhani
 
Ds02 flow chart and pseudo code
Ds02 flow chart and pseudo code
jyoti_lakhani
 
Ds01 data structure introduction - by jyoti lakhani
Ds01 data structure introduction - by jyoti lakhani
jyoti_lakhani
 
Ad

Recently uploaded (20)

FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
Providing an OGC API Processes REST Interface for FME Flow
Providing an OGC API Processes REST Interface for FME Flow
Safe Software
 
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
Edge AI and Vision Alliance
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
AmirStern2
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 
Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
Providing an OGC API Processes REST Interface for FME Flow
Providing an OGC API Processes REST Interface for FME Flow
Safe Software
 
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
AudGram Review: Build Visually Appealing, AI-Enhanced Audiograms to Engage Yo...
SOFTTECHHUB
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
Edge AI and Vision Alliance
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
AmirStern2
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 
Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 

Ids 007 trojan horse

  • 2. A malware which misleads users of its true intent. The term is derived from the Ancient Greek story of Trojan Horse that led to the fall of the city of Troy Trojans are generally spread by – - a user is duped into executing an email attachment disguised to appear not suspicious, (e.g., a routine form to be filled in) - by clicking on some fake advertisement Their payload act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. Trojan
  • 3. Unlike computer viruses and worms, trojans generally do not attempt to inject themselves into other files Trojan viruses, in this way, may require interaction with a malicious controller (not necessarily distributing the trojan) to fulfill their purpose. It is possible for those involved with trojans to scan computers on a network to locate any with a trojan installed, which the hacker can then control, creating a so called botnet. A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of- Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity. It can also delete a user's files or infect other devices connected to the network. Ransomware attacks are often carried out using a trojan.
  • 4. Some trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage, enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the infected computer or its IP address. An anonymizer proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information
  • 5. According to a survey conducted by BitDefender from January to June 2009, "trojan-type malware is on the rise, accounting for 83% of the global malware detected in the world." Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer trojan horses tended to leave their tracks in the page view histories of the host computer. Later generations of the trojan tend to "cover" their tracks more efficiently.
  • 6. Examples of Trojan Horse Virus Infection Trojan Infection Exploit Backdoor Rootkit Trojan Banker Trojan DDoS Trojan Downloa der Trojan Dropper
  • 7. Remote Access Trojan Data Sending Trojan Destructive Trojan Proxy Trojan FTP Trojan Security Software Disabler Trojan DoS Attack Trojan Types of Trojan
  • 8. Victim Attacker TCP Trojan Server Trojan Client Components of Trojan Horse
  • 9. Zeus Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. The majority of computers were infected either through drive-by downloads or phishing scams. First identified in 2009, it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.
  • 13. Beast
  • 14. CryptoLocker CryptoLocker is a form of Trojan horse ransomware targeted at computers running Windows. It uses several methods to spread itself, such as email, and once a computer is infected, it will proceed to encrypt certain files on the hard drive and any mounted storage connected to it with RSA public key cryptography. While it is easy enough to remove the malware from the computer, the files will still remain encrypted. The only way to unlock the files is to pay a ransom by a deadline. If the deadline is not met, the ransom will increase significantly or the decryption keys deleted. The ransom usually amount to $400 in prepaid cash or bitcoin.
  • 16. Flashback • One of the few Mac malware • It showed that Macs are not immune. • The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. • In its newer incarnation, a user simply needs to have Java enabled. It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.