An Introduction to Trojan Horse Malware

January 4, 2016 | Views: 7587

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

There are different and distinct types of malware. In this post, we’ll discuss Trojan Horse Malware. We’ll cover what a Trojan Horse is, some of what they’re capable of doing, how they’re spread and what to do if you have one on your system.

According to Kaspersky Labs, six of the top ten web-based malicious programs of 2015 were Trojans. You can’t miss the high-profile types of Trojan attacks in the news, which include Ransomeware.

Some believe that only Windows computers are susceptible to malware attacks. However, there have been instances of Trojans designed for OSX and even Linux. They’re problematic for all users.

What is Trojan Horse Malware?

Trojan Horse Malware is an executable program that performs a malicious task while also doing something, or appearing to do something, benign. For example, in 2011 there was an OSX Trojan that imitated the Adobe Flash installer. That same year, another Trojan was hidden inside a PDF file that also targeted OSX.

In these examples, the malicious program is embedded into something that a user could potentially want and willingly downloads. But, unlike some other malware, Trojans do not self-replicate or reproduce by infecting other files.

What do Trojans do?

Trojans have a variety of abilities and purposes. The 2011 PDF file Trojan mentioned above attempted to install a backdoor in the OS to grant unauthorized access. From the Kaspersky Labs website, we find that Trojan Horse Malware performs actions including installing rootkits, installing backdoors, stealing/modifying data, locking a computer so it can’t be accessed, and much, much more.

An Ounce of Prevention

One of the best ways to prevent infection from a Trojan attack is to download only programs and information from trusted sources. Keeping software up to date to patch vulnerabilities will also help to prevent infections. If a vulnerability a Trojan is designed to exploit has been fixed by a patch, the Trojan will not be able to exploit it. Antivirus software that’s regularly updated can also help protect your system from Trojan attacks.

If You’ve Been Infected by a Trojan

There are several tools available for users who’ve been infected by a Trojan. Certain websites are designed to scan your computer for Trojan infections, though it’s important to choose wisely – some websites claim to scan your computer, yet will install malware while doing so.

Several of the major antivirus companies have online tools to help with the removal of malware. Yet, the only 100% sure way according to some is to completely reinstall your operating system. In fact, in cases where Ransomeware has completely locked a system, reinstalling may be the only option.

It’s important to know what Trojan Horse Malware is and how it spreads, to protect your systems form infection. Equally important is to know what tools are available to help mitigate exposure to infection and what to do if you suspect your system has been compromised.


Bibliography

Cluley, Graham, “Mac OS X Trojan hides behind malicious PDF disguise”, Naked Security, Sophos, 23 SEP 2011, 31 Dec 2015, nakedsecurity.sophos.com/2011/09/23/mac-os-x-trojan-hides-behind-malicious-pdf-disguise/

Kaspersky Lab, “What is a Trojan Virus?” Kaspersky Lab, 27 Dec 2015, usa.kaspersky.com/internet-security-center/threats/trojans

Kaspersky Lab, “Avoiding a Trojan Virus: Keeping the Gates Closed” Kaspersky Lab, 27 Dec 2015, usa.kaspersky.com/internet-security-center/avoiding-a-trojan-virus

Kaspersky Lab, “Kaspersky Security Bulletin 2015”, Kaspersky Lab, 30 Dec 2015

Kessler, Topher, “Another OS X Trojan imitates Adobe Flash Installer” C|Net, 26 Sep 2011, 30 Dec 2015, www.cnet.com/news/another-os-x-trojan-imitates-adobe-flash-installer/

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
10 Comments
  1. I what to know if in africa we can use it also becouse so advence

  2. Is this possible for Kali Linux cos i recently notices some slow in performance and speed of my Kali Linux… And i am suspecting some backdoor running on my Linux system.. How do i check for running programme apart from nestat.

  3. thanks for the trick, but i am not contented with your description of the trojan

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel