Types of Trojans and Their Malicious Capabilities, Trojans are one of the most popular and widely used malware for cyber crime.
Trojans always attack targets by impersonating or tricking their victims, as the name suggests.
Trojan or Trojan Horse is a symbol of the defeat of the inhabitants of the Trojan city when facing the Greek troops.
The Greek soldiers tricked the inhabitants of Troy with a large wooden horse inside which turned out to be soldiers.
It was this army that deceived the residents of the city of Troy. Likewise with this Trojan cyber crime system.
Before infiltrating a computer system, Trojan criminals will use tricks with various social engineering tricks to get victims to run malicious programs.
Trojans are notorious for targeting financial institutions that are given orders to steal victims’ personal data, including creating backdoors on victim systems.
Trojans have a number of capabilities, such as deleting, blocking, modifying, and copying data and disrupting computer or network performance.
Unlike computer viruses and worms, Trojans cannot self-replicate.
The following are different types of Trojans with different tasks:
This type gives the user remote control over the infected computer.
Allows cybercriminals to do anything to the victim’s computer, including sending, receiving, launching and deleting files, viewing data, and being able to or rebooting the computer.
This type is commonly used to form botnet networks or computer zombies for criminal purposes.
Programs that contain data or code that exploit vulnerabilities in application software running on the computer
Programs designed to hide certain objects or activities on a computer system.
Its purpose is to prevent malicious programs from being detected, as well as to extend the period they run on infected computers.
- Trojan Banker
This type is designed to steal victim’s account data in online banking systems, electronic payment systems, and credit or debit cards.
- DDoS Trojan
This type is designed for a Denial of Service attack against a targeted website address.
By sending different solicitations, from your PC and a few other tainted PCs.
The attack is like flooding the target address with fake traffic with the aim of taking down the victim’s server.
- Trojan Downloader
Can download and install new versions of malicious programs onto victims’ computers, including Trojans and adware.
- Trojan Dropper
Used by hackers to install Trojans and can be viruses. Also, they are used to prevent malware detection.
Not all antivirus programs are capable of scanning all components of this type of Trojan.
- FakeAV Trojan
It behaves like antivirus software, but is designed to extort the victim’s money.
This program is designed to detect and remove cyber threats even if there are no reported threats.
For example, this malware displays lots of repeated pop-ups as a trick to make users worry about the security of their systems and pay for fake AV software.
- GameThief Trojan
Designed to steal user account information from online games.
- IM Trojan
Has the ability to steal victim logins and passwords for instant messaging programs or applications.
- Ransom Trojan
This Trojan can modify data on the victim’s computer so that the computer does not run properly. Or, the victim can no longer use certain data.
Criminals will only restore computer performance or unblock data after the victim has paid the ransom they asked for.
- SMS Trojan
This Trojan infects mobile devices and can send and prevent text messages. SMS to premium rate numbers can increase your cell phone costs.
- Trojan Spy
Spying on victims using a computer, for example by tracking data entered via the keyboard, taking screenshots or getting a list of running applications.
- Mailfinder Trojan
This program can retrieve email addresses from the victim’s computer.
- Trojan Clicker
Designed to access internet resources, usually web pages, by sending the appropriate commands to the browser.
A hacker uses this program to increase the number of visits to a website, increase the number of clicks for online advertisements, and carry out Denial of Service attacks on certain servers.
- Trojan Proxy
Designed to give hackers access to various internet resources via a victim’s computer, this malicious program is typically used to send bulk spam emails.
- PSW Trojan
Intended to take client account data, for example, logins and passwords from tainted PCs. PSW stands for Password Stealing Ware.
- Trojan Notifier
Designed to send messages to notify the criminals controlling it while the infected computer is online.
The hackers will receive information about the infected computer, such as IP address, open port numbers, email addresses, etc.
Such information can be sent by various methods such as email, special requests sent to malicious users’ websites, or via instant messages.
- ArcBomb Trojan
Malware designed to freeze or slow down performance by flooding the hard disk with large amounts of free data.
Of course, this empty archive bomb can easily crash a server or run slow, even crash.
Those are the types of Trojans and their dangerous abilities, I hope this information is useful. And stay safe on the internet. thanks.