Description of Trojan Attacks

Trojan

Don't use plagiarized sources. Get Your Custom Essay on
Description of Trojan Attacks
Just from $13/Page
Order Essay

Abstract—The amount of electronic devices associated with the internet is constantly on the rise, with increasing number of devices there is also an expansion in the number of cyber threats. In this paper, we discuss about Trojan horse which is said to be one of the serious threats to computer security. We discuss about description of trojans, exploits of trojans. It is  important to take preventive measures against trojans.

Keywords—Trojans, Cybersecurity, Attacks, Defense, Hacker

I.                         Introduction

Trojan is a type of malware [1] which is often come seen as a legitimate software.  Hackers/Cyber criminals utilize them to bait them into stacking and executing trojans on their frameworks. Upon actuation cyber criminals the target framework is monitored for retrieving sensitive data and gaining secondary access to one’s framework. Upon gaining access they can perform data deletion, block users data, modify, copy and disrupting the performance of computers or computer networks [1]. Unlike computer viruses and worms, Trojans does not self-replicate. They come as an innocuous programming. Normally Trojans are offered as breaks or keygens, something which ought not be called safe, but rather clients fall prey to downloading them as they feel it is helpful.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Opening your framework to more damage is likewise a wide field of potential outcomes on the grounds that there are numerous sorts of Trojans — the majority of them named after their principle work. It would be ideal if you take note of that it isn’t phenomenal for Trojans to have various capacities and the meaning of Trojans isn’t limited and is available to exchange, so the rundown will never be finished.

II.                  Working

The victim receives a phishing email which closely resembles the original official-looking email with an attachment included. The malicious code being present in the attachment is executed as soon as the victim clicks on it. The system behaves normally and does not arise suspicion. Until a specific date or an action, the malicious code remains dormant undetected in the system. At the instance when the target visits a specific site for example an online financial balance ,the malignant code is activated and does the intended activity. The functionality of the trojan varies-either it deletes itself, continues to remain in the dormant state or remains active.

                        Fig1[5]                Trojan working

III.                Types of trojans

Trojan-Downloader [1]:New version of malware are downloaded and installed by this type of trojan.

Trojan-Droppers [1]:Malware are installed on a system which remains unnoticed by the help of complex programs. Droppers go undetected as malicious by most antivirus , hence, they are used to installing viruses.

Ransomware [1]: The target computer/system’s data is encrypted by this type of trojans. The cyber criminals owning the ransomware would demand a ransom for providing the decryption key. Data recovery without the decryption key is very tough. On receiving the money the criminal consents to send a program that can reinstate  the data or the computer’s normal performance. The WannaCry and Petya were recent ransomware attacks. Cyber security experts advice users to follow a sound and methodical backup and recovery policy

Trojan-Banker [1]:this type malware programs extracts account-related information such as debit/credit card etc.

Trojan-Rootkits [1]: these prevent the detection of malware and malicious activities on the computer. These are complex malware which provides access to the target device. Victim’s device is enrolled as part of a botnet by the Rootkits.

Trojan-Backdoor [1]:is a popular and the most widespread type of Trojan. A backdoor is created which allows cyber criminals to gain complete access of the computer remotely using a remote access tool (RAT). As this Trojan provides complete control over the computer such as sending, receiving, deleting and rebooting files on the computer, backdoor Trojans are for the most part utilized by programmers to hack into a bunch of infected systems to build a zombie chain or malignant botnet that can be utilized for criminal objectives.

Destructive Trojans [1]: these type of trojans simply destructs the targets data for the sake of creating havoc.

Security software disabler [1]: these Trojans are configured in such a way that the security programs are eliminated which makes a system without a firewall, Audio Visual Security, Host Intrusion Prevention System or other protection. The main aim is to make the user’s system vulnerable to net level of the attack.

Trojan-Arc Bomb [1]: these usually intend to  slow down and hamper the mail servers. The Trojans objective is to reduce performance or wrack up a computer by packing tremendous amount of records in a relatively small package. When it is opened, the volume increase is so enormous that the server has to devote a significant quantity of its CPU time and drive space to dealing with the Trojan.

Trojan SMS [1]: here the mobile devices are targeted by these type of Trojans. Short Message Services are being utilized to send and intercept messages. They  send text messages to arbitrary  numbers and gets cash for the proprietor of the Trojan.

DDoS attack [1]: In this the cyber criminals taint a great amount of computers with this type of trojans beforehand (for instance, as part of a mass spam mailing). Due to this, every infected computers will attack the target machine/server/site at the signal initiated by the controller. Vast gatherings of system’s under control along these lines are frequently referred to a botnets.

 Trojan Clicker [1]: used to perform online activities  with the end goal to help hit-check 

Proxy Trojan [1]: the target PC is transformed into an intermediary so the administrator can perform online business namelessly.

Mailfinder Trojans [1]: these collect email addresses from the contaminated PC in any capacity they can and send the rundown of addresses to the administrator.

IV.                High profile attacks

Zeus [3]:Initially operated as a banker Trojan, targeted limited group of people, but over the years various Zeus botnets are estimated to have affected millions of compromised computers. A hacker could build his own Trojan horse using the Zeus crimeware toolkit that allows a hacker to build his own Trojan horse. Came to limelight in 2007, the Trojans based on Zeus was still considered the most dangerous  in the world, utilizing form grabbing, keylogging and polymorphic variants of the Trojan that use drive-by downloads to capture users data.

Zero Access Rootkit [4]:Millions of systems were infected by the botnet spread and the number is rising till date.

Adwind [4]:These are configured using Java which is dispersed as a solitary malware-as-a-service. They can be utilized to remotely control tainted PC’s; to acquire documents, key strokes and stored passwords. It can also record audio and video through the computer’s webcam and microphone. Plug-ins can also be used to enhance its functionality.

AlienSpy RAT [4]:has assaulted nearly 400,000 corporate and private targets in the finance, social body, education and engineering sectors around the world according to reports and have been instructed to remain aware. Also referred to as AlienSpy, Frutas, Unrecom, Sockrat, JSocket and jRat. The RAT is sent as a payload to individual machines by phishing. If target  opens an email document stacked with a pernicious AlienSpy JAR file, the malware introduces itself on the PC and endeavors to communicate with the operator’s command and control (C&C) server for additional instructions.

Bitfrost [1]:remote access Trojan (RAT) that contaminated Windows customers by changing, making and modifying segments.

Tiny Banker [1]:allowed attackers to steal sensitive financial information. Specialists in the Center for Strategic and International Studies Security Group distinguished ‘Tinba’ in 2012 after two dozen noteworthy U.S. banks were tainted.

FakeAV Trojan [1]:embedded itself in the Windows framework tray and persistently displayed an official-looking pop-up window, cautioning the client to a problem with the computer. In the process of resolving the issue ,clients were tricked into downloading more malware.

Magic Lantern [1]: Trojan developed by the FBI, which is based on keystroke logging to facilitate with criminal monitoring activities.

                         V.       Defense mechanism

To increase your odds of not encountering a Trojan, follow these guidelines

Remain diligent [2]:Computers can be infected by trojans via websites, attachments in emails and instant messaging applications. Only when we are sure of the source the files should be downloaded.

Ensure operating system is up to date [2]:It is very important if one is using a Windows operating system.

         Install reliable anti-virus software [2]:It is essential one downloads any updates regularly to filter different types of trojans , viruses, and worms. Care should be taken to ensure that the e-mails and files which are downloaded are examined thoroughly.

Consider installing a firewall [2]:.A firewall can restrict unauthorized access to a system. When it is used along with a updated operating system and an efficient anti-virus software greatly helps to prevent infection.

V.                  Conclusion

This paper presents the description of trojan in detail. It also consists of different types of trojan, detection and preventive measures that can be taken to protect an organization or an individual user against trojan attack. It recommended not to open unless one is certain of its authenticity. This concerns particularly to e-mail documents that contain .exe files. Even if one is aware sure the attachment is authentic, it is still recommended to run it through your virus scan program (with the latest virus definitions) as a precaution. One should keep in mind of how things ended for the people of Troy- Never let a trojan find a way into your devices.

References

[1]      Kaspersky lab,”What is a Trojan Virus”,2018.[Online].Available:

https://www.kaspersky.com/resource-center/threats/trojans

[2]      P.Arntz,”What are Trojans?”,2013.[Online].Available:

https://www.blog.malwarebytes.com/cybercrime/2013/06/What-are-trojans.htm [Accessed on Oct.19,2018]

[3]      PCsecurityworld,”Trojan Horse Malware Detection”,2018.[Online].Available:

https://www.pcsecurityworld.com/83/trojan-horse-malware-detection-prevention.html [Accessed on Oct 15,2018]

[4]      SearchSecurity”Trojan Horse computing”,2017.[Online].Available:

https://searchsecurity.techtarget.com/definition/Trojan-horse

[5]   M86BankTrojan.(2010).[online]Available:

        http://i.i.cbsi.com/cnwk.1d/i/tim/2018/08/10/M86BANKTROJAN.png [Accessed on 20 Oct.2018]
 

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy