Trojan Horse is a program that contains malicious code to damage files and steal confidential data from infected computers. It always pretends to be some common files ( i.e., a photograph, a music file, a text file, a PC game,etc. ) so that PC users will invite the Trojan into their computer unconsciously. In general, it consists of two parts including controlling terminal and controlled terminal. Hackers are given access to your computer and personal information by Trojan. Any unauthorized change on the infected computer will not be noticed untill it is done. Trojan horse is not able to replicate themself like other computer virus, but they have the ability to download other virues or malware on your computer and spy on your all activities for pursuing economic benefits.
Types of Trojan Horse
Different Trojan horses are designed for respective purposes. They can be mainly classified by their functions:
Backdoor: This kind of Trojan can make use of Internet to connect the compromised PC with remote hackers without computer user’s approval. The attackers can change the system settings easily and take control over the computer fully to do anything they want.
Banker: Such Trojan aims at stealing users’ online banking login credentials or other financial information of online payment system like credit card details, user names and so on. Internet banking now is an ideal target of cyber criminals.
DDoS: This infection will conduct denial-of-service (DoS) or distributed denial-of-service (DDoS) attack to make the target computer’s online service unavailable. There will be flood of requests sent from various source overwhelms the computer and eventually forces the machine shut down.
Downloader:This type of Trojan will download and install other computer threats onto your computer. As long as the computer can access the Internet, it will download and install detrimental adware, viruses or Trojan horse on your PC surreptitiously.
Exploit: It is created to attack the vulnerabilities of the system or software in order to install other computer infections. In general, this kind of Trojan occupies a very small space on computer memory.
FakeAV:This Trojan is designed to scare PC users by making them believe that their computer system are infected with viruses. In such way the authors of this Trojan can direct users to purchase bogus antivirus programs or technical supports in order to remove the threats, so they can extract illegal cash from innocent users.
Ransom:It is kind of ransomware threat that block users from using their computer properly and accessing their files. Users are not allowed to unblock the data or run the computer unless they pay a high ransom as the hacker demands.
Rootkit: Apart from downloading unwanted applications on to the compromised computer, it can concel itself as well as other malicious programs that it brings into the computer to avoid being detected.
Spy: This malware program can lurk on a computer system while users are using the computer. It is able to record every move of users’ behaviors and collect important data such as keystrokes, search queries. It can even take screenshots of the active programs and send them to cyber criminals for financial benefit.