Wednesday, December 17, 2014

Trojan - The Most Unwanted Thing

Trojan


Trojan is MALWARE program that contains MALICIOUS code. The program that perform malicious activity that is not authorized by the user or victim.

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. 


Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

RAT (Remote Administration Tool): 

Remote Administration Tool is used to Trojans. With the help of RAT you can create Trojan easily. It is also used to control Victims PC. RAT is created by the Hackers to help Hackers.
Rat are available for both types of Trojans (Direct Connection, Reverse Connection Trojan). There are numerous RATS available over the internet.



If Trojans gets into your system then it will collect all your personal information without you being aware of it. Trojans are very difficult to remove on your own and slow down your PC. We can say Trojan as a program. This program gets installed in the background while you are doing something else on the internet. Trojans has fairly widespread because of your cable modem or DSL connection is always connected.

With the help of Trojan an attacker can get access to stored password, he can able to read your personal documents stored in your PC, delete files, and he show the images on the screen.

Difference between Virus, Worms and Trojans:




TROJAN: Trojan is a program that once executed performs a task other then expected. 

VIRUS: Virus is an application it self replicates by injecting its code into other data files. Virus spreads and attempts to consume specific targets and are normally executable.

WORMS: Worm copies itself over a network. It is a program that views the infection points of another computer rather than as other executable files on an already infected computer.

Types of Trojans:
1. Direct connection Trojan
2. Reverse connection Trojan

Trojans are transmitted in many ways:
1. Email Attachments
2. Physical Access
3. Software
4. Images
5. Advertisements
6. Fake programs


Trojan Creators looks for:
1. Confidential Documents
2. Credit Card Information
3. Account Data (Email, Password, Username, etc)
4. Financial Data
5. Using Victims PC for illegal purpose.

BEAST:
Beast is a Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a RAT. It is capable of infecting versions of Windows from 95 to XP.



Beast was one of the first Trojans to feature a reverse connection to its victims, and once established it gave the attacker complete control over the infected computer. Beast came with a built-in firewall by-passer and had the ability of terminating some Anti-Virus or firewall processes. It also came with a binder that could be used to join two or more files together and then change their icon.

It is discontinued in year 2004 and any PC infected by Beast can be easily disinfected by starting windows XP in safe-mode and than removing some infected system files. Also the system restore must be turned off to do this process.

Stay Safe !!!

No comments:

Post a Comment