- Get link
- Other Apps
- Get link
- Other Apps
Invisible Trojans
Invisible Trojans do a lot of damage. What Trojans are out there and what can you do to prevent them from infecting your devices.
According to mythology, the
Greeks conquered the city of Troy by building a wooden horse. Soldiers hid
in its hull. They gave the horse to the Trojans who drew it to their city. At
night the Greek soldiers crawled out of their hiding place. They opened
the city gate and let more fighters into the city, who then destroyed Troy .
Today
they are no longer made of wood and do not smuggle in warriors. Nevertheless,
invisible Trojans cause damage to computers, tablets and smartphones just as
much as their historical model. Because they smuggle in viruses, for
example. Accordingly, the goal of their propagators is not to destroy a
city. Their tasks range from installing additional malware to spying on
data and destroying all files.
How Does the
Horse Get Into the Calculator?
Invisible
Trojans are often hidden in apparently harmless programs, email attachments,
pictures / videos or behind links. One click is all it takes to install
the malware unnoticed. In contrast to viruses and worms, Trojans cannot
reproduce by themselves. However, they are often lumped together with
these.
However, worms are self-contained
malicious programs that copy themselves and spread over computer networks. So
you are active.
Viruses, on the other hand, need an active host program or an already
infected and active operating system in order to be executed, to cause damage
and to infect other program files and documents. That is why they are
(initially) passive.
It
is not uncommon for invisible Trojans to serve as the host program. There
are all-rounders who perform a wide range of tasks. But also specialists
whose activity only pursues a specific goal.
Backdoor Exploit
The
name says it all, because this malware comes through the back door . As
a result, they initially reach the computer without being noticed. Then
they do not limit themselves to a specific task. Rather, they access a
wide variety of data. This enables them to independently call up and
display files, receive and send messages or delete the files. It is also
possible to trigger a computer restart.
Invisible
Trojans of the exploit type are
particularly common . Because these are programmed in such a way that
they detect weak points in other programs and exploit them in a targeted manner .
Rootkit - Trojan.Dropper
Both
are obfuscation programs
that hide deep in the system. This is why they can be difficult to find
even by antivirus software.
While
invisible Trojans with administrator
rights allow the attacker permanent access to the PC and
the installation of (new malware) programs, the dropper stores various virus
programs in a subfolder of its own.
Trojan.DDoS
As D istributed D enial o f S ervice
(distributed denial of service) attack waves are referred to. B. lead to
overloading of a server. Accordingly, Trojan-DDoS sends inquiries to an
address until the respective service refuses the service.
Trojan.Downloader
As
the name downloader suggests,
it independently downloads additional
malware or advertising programs (adware).
The specialists
There
are also invisible Trojans that only perform a single task. They either
steal ...
- Bank data = Trojan.Banker
- Game Account Data = Trojan-GameThief
- Login
data and passwords for (instant) messengers = Trojan-IM
- Email
addresses = Trojan.Mailfinder
Or
they spy on
(Trojan.Spy) computers by ...
- record
data entered on the keyboard,
- Take
screenshots,
- switch
on the microphone or
- Get
data from running applications.
No
less harmful is Trojan.SMS ,
which sends messages to paid premium numbers. You will then find the costs
on your mobile phone bill.
Blackmail Malware
First
of all, this includes the Trojan
Fake AV . This simulates the activity of an
antivirus program. After reporting a threat to you, the malware offers you
to remove it for a fee.
Trojan.Ransom
Trojan-Ransom in particular (ransom
Trojans) has already caused considerable economic damage. Because
it changes the files on computers or locks the devices completely. You
should then pay a certain amount in order to be able to use your PC again. However,
there is no guarantee that this recovery will occur after payment.
Known
malware of this type are z. B. Locky (2016), Wannacry (2017) and Petya
(since 2017).
Precautions
Most
malicious programs are transmitted directly over the Internet. But the
infection can also take place indirectly by installing infected applications /
files from DVDs or USB sticks on your device yourself.
While
an up-to-date anti-virus program including a firewall should be available on
devices with Windows operating systems, the (preventive) effect of these
programs on Android devices is controversial. In addition, invisible
Trojans know how to hide from such protection programs.
Therefore, among other things.
These precautionary measures are all the more
important:
· the same applies to opening attachments of such emails,
· Install programs only from trustworthy sources,
· Download apps only from the Windows Store, App Store or Google Play,
· do not randomly upload data from (third-party) external data carriers and
· Above all, always keep the operating system up-to-date.
DDoS
Distributed Denial of Service
Invisible Trojans
Malicious
Malware
Ransom
Rootkit
Trojans Variants
WannaCry
- Get link
- Other Apps
Comments
Post a Comment