Invisible Trojans | the 3 Most Common Variants | Anti-Virus Program

Invisible Trojans

Invisible Trojans do a lot of damage. What Trojans are out there and what can you do to prevent them from infecting your devices.


Invisible Trojans | Anti-Virus Program


According to mythology, the Greeks conquered the city of Troy by building a wooden horse. Soldiers hid in its hull. They gave the horse to the Trojans who drew it to their city. At night the Greek soldiers crawled out of their hiding place. They opened the city gate and let more fighters into the city, who then destroyed Troy .


Today they are no longer made of wood and do not smuggle in warriors. Nevertheless, invisible Trojans cause damage to computers, tablets and smartphones just as much as their historical model. Because they smuggle in viruses, for example. Accordingly, the goal of their propagators is not to destroy a city. Their tasks range from installing additional malware to spying on data and destroying all files.


How Does the Horse Get Into the Calculator?

Invisible Trojans are often hidden in apparently harmless programs, email attachments, pictures / videos or behind links. One click is all it takes to install the malware unnoticed. In contrast to viruses and worms, Trojans cannot reproduce by themselves. However, they are often lumped together with these.


However, worms are self-contained malicious programs that copy themselves and spread over computer networks. So you are active.


Viruses, on the other hand, need an active host program or an already infected and active operating system in order to be executed, to cause damage and to infect other program files and documents. That is why they are (initially) passive.


It is not uncommon for invisible Trojans to serve as the host program. There are all-rounders who perform a wide range of tasks. But also specialists whose activity only pursues a specific goal.


Backdoor Exploit

The name says it all, because this malware comes through the back door . As a result, they initially reach the computer without being noticed. Then they do not limit themselves to a specific task. Rather, they access a wide variety of data. This enables them to independently call up and display files, receive and send messages or delete the files. It is also possible to trigger a computer restart.


Invisible Trojans of the exploit type are particularly common . Because these are programmed in such a way that they detect weak points in other programs and exploit them in a targeted manner .


Rootkit - Trojan.Dropper

Both are obfuscation programs that hide deep in the system. This is why they can be difficult to find even by antivirus software.


While invisible Trojans with administrator rights allow the attacker permanent access to the PC and the installation of (new malware) programs, the dropper stores various virus programs in a subfolder of its own.


Trojan.DDoS

As D istributed D enial o f S ervice (distributed denial of service) attack waves are referred to. B. lead to overloading of a server. Accordingly, Trojan-DDoS sends inquiries to an address until the respective service refuses the service.


Trojan.Downloader

As the name downloader suggests, it independently downloads additional malware or advertising programs (adware).


The specialists

There are also invisible Trojans that only perform a single task. They either steal ...

  • Bank data = Trojan.Banker
  • Game Account Data = Trojan-GameThief
  • Login data and passwords for (instant) messengers = Trojan-IM
  • Email addresses = Trojan.Mailfinder

Or they spy on (Trojan.Spy) computers by ...

  • record data entered on the keyboard,
  • Take screenshots,
  • switch on the microphone or
  • Get data from running applications.

No less harmful is Trojan.SMS , which sends messages to paid premium numbers. You will then find the costs on your mobile phone bill.


Blackmail Malware

First of all, this includes the Trojan Fake AV . This simulates the activity of an antivirus program. After reporting a threat to you, the malware offers you to remove it for a fee.


Trojan.Ransom

Trojan-Ransom in particular (ransom Trojans) has already caused considerable economic damage. Because it changes the files on computers or locks the devices completely. You should then pay a certain amount in order to be able to use your PC again. However, there is no guarantee that this recovery will occur after payment.

Known malware of this type are z. B. Locky (2016), Wannacry (2017) and Petya (since 2017).

 

Precautions

Most malicious programs are transmitted directly over the Internet. But the infection can also take place indirectly by installing infected applications / files from DVDs or USB sticks on your device yourself.

While an up-to-date anti-virus program including a firewall should be available on devices with Windows operating systems, the (preventive) effect of these programs on Android devices is controversial. In addition, invisible Trojans know how to hide from such protection programs.

Therefore, among other things. 


These precautionary measures are all the more important:

·         do not click any links in e-mails of unknown origin,
·         the same applies to opening attachments of such emails,
·         Install programs only from trustworthy sources,
·         Download apps only from the Windows Store, App Store or Google Play,
·         do not randomly upload data from (third-party) external data carriers and
·         Above all, always keep the operating system up-to-date.

Comments