Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

PRESENTATION

E-TECH
GROUP
2
members: Sharina tolentino
Charlyn balateria
1 TROJAN HORSE

CONTENTS
2 ROGUE SECURITY
SOFTWARE
WHAT IS TROJAN HORSE?

A Trojan Horse Virus is a type of malware


that downloads onto a computer disguised
as a legitimate program. The delivery
method typically sees an attacker use social
engineering to hide malicious code within
legitimate software to try and gain users'
system access with their software.
Also the Trojan horse was developed by
computer programmer John Walker in
1975, according to Fourmilab.
Trojans are malware, and like
most forms of
malware, Trojans are designed to
damage files,
redirect internet traffic, monitor
WHAT TROJAN
HORSE CAN DO? the user's
activity, steal sensitive data or
set up backdoor
access points to the system.
A Trojan Horse Virus is a type of
HOW DOES A
TROJAN HORSE
malware that downloads onto a
VIRUS WORK? computer disguised as a
legitimate program.
MOST COMMON TYPE OF
TROJAN HORSE
M A LW A R E
Backdoor Trojan: Opens a backdoor on

infected systems, allowing remote

access and control by attackers.


Downloader Trojan: Downloads and
installs other malware onto the
infected system. It often disguises
itself as legitimate software or files.
Remote Access Trojan (RAT):
Provides attackers with complete
control over infected systems,
Banking Trojan: Targets online
enabling them to perform various banking users to steal financial
malicious activities remotely. information such as login
credentials, credit card numbers,
and banking details.
Fake Antivirus Trojan:
Masquerades as legitimate
antivirus software, tricking users
into purchasing fake security
products or providing personal Distributed Denial-of-Service (DDoS)
information. Trojan: Turns infected systems into
bots or zombies, used to flood
target websites or servers with
traffic, causing denial of service.
Rootkit Trojan: Installs malicious
software that hides its presence
and maintains privileged access
to the infected system, often
exploiting OS vulnerabilities.
Spy Trojan: Spies on user
activities, capturing sensitive
information such as browsing
habits, login credentials, and
personal data.
Short message service
(SMS) Trojan: Targets mobile
devices, sending premium-
rate SMS messages without Ransomware Trojan: Encrypts files
the user's knowledge or on the infected system and
consent, resulting in financial demands payment from the user to
loss. decrypt them, often posing as law
enforcement or government
agencies.
SUNBURST: The SUNBURST trojan virus was
released on numerous SolarWinds Orion Platform.
Victims were compromised by trojanized versions
of a legitimate SolarWinds digitally signed file
named: SolarWinds.Orion.Core.BusinessLayer.dll.
The trojanized file is a backdoor. Once on a
target machine, it remains dormant for a two-
week period and will then retrieve commands that Infostealer Trojan:
allow it to transfer, execute, perform This malware can either be used to
reconnaissance, reboot and halt system services.
Communication occurs over http to
install Trojans or prevent the user
predetermined URI's. from detecting the existence of a
malicious program.
Instant messaging (IM) Trojan:
This type of Trojan targets IM services to
steal users’ logins and passwords. It
targets popular messaging platforms such
as AOL Instant Messenger, ICQ, MSN
Messenger, Skype, and Yahoo Pager.
Game-thief Trojan:
A game-thief Trojan is specifically
designed to
steal user account information from
people playing online games.
Exploit Trojan:
An exploit malware program contains code
or data that takes
advantage of specific vulnerabilities within
an application or
computer system.
Banker Trojan:
A banker Trojan is designed to target
users’ banking accounts and financial
information.
Example of Trojan Horse Virus Attacks

Trojan attacks have been responsible for causing major damage by


infecting computers and stealing user data. Well-known examples of
Trojans include:

①Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker


tool—which enables an attacker to use a device to mine
cryptocurrency—to infect devices.
②Tiny Banker: Tiny Banker enables hackers to steal users’ financial
details. It was discovered when it infected at least 20 U.S. banks.
③ Zeus or Zbot: Zeus is a toolkit that targets financial services and enables
hackers to build their own Trojan malware. The source code uses
techniques like 3.form grabbing and keystroke logging to steal user
HOW TO PROTECT
YOURSELF IN TROJAN
HORSE?
To protect yourself from Trojan horse malware, here are some key steps you can take:

Use Reliable Antivirus Software: Install reputable antivirus or anti-malware software on


your devices and keep it updated. Antivirus programs can detect and remove Trojan
horse malware before it causes harm.

Keep Your Software Updated: Regularly update your operating system, web browsers,
and other software applications to patch security vulnerabilities. Many Trojan horses
exploit known vulnerabilities in outdated software.

Exercise Caution with Email Attachments and Links: Be cautious when opening email
attachments or clicking on links, especially if they're from unknown or suspicious
sources. Trojan horse malware is often distributed via phishing emails containing
malicious attachments or links.

Use a Firewall: Enable a firewall on your devices to monitor and control incoming and
outgoing network traffic. Firewalls can help block unauthorized access and prevent
Trojan horse malware from communicating with its command-and-control servers.
Be Mindful of Downloads: Only download files and software from reputable sources. Avoid
downloading files from untrustworthy websites or clicking on pop-up ads, as they may contain
Trojan horse malware.

Enable Security Features: Enable security features such as pop-up blockers, phishing filters, and
safe browsing modes in your web browser to protect against malicious websites and drive-by
downloads.

Practice Safe Browsing Habits: Avoid visiting suspicious websites or clicking on suspicious links.
Stick to reputable websites and only enter personal information on secure websites with HTTPS
encryption.

Use Strong Passwords and Enable Two-Factor Authentication (2FA): Use strong, unique passwords
for your accounts and enable two-factor authentication wherever possible. This adds an extra layer
of security to your accounts, making it more difficult for attackers to gain unauthorized access.

Regularly Back Up Your Data: Back up your important files and data regularly to an external hard
drive, cloud storage service, or another secure location. In the event of a malware infection, you
can restore your data from backups without losing valuable information.

Stay Informed and Educated: Stay informed about the latest cybersecurity threats and trends, and
next topic
WHAT IS ROGUE SECURITY
SOFTWARE?

Rogue security software is a form of


malicius software and internet fraud that
misleads users into believing there is a
virus on thier computer and iams to
convince them to pay for a fake malware
removal tool thst actually installs
malware on their computer. It is a form of
scareware that manipulates user through
fear, and a form of ransomware. Rogue
security software has been a serious
security threat in desktop computing
since 2008. An early example that gained
infamy was SpySheriff and its clones,
such as Nava Shield
types of rogue Fake Antivirus Programs: These

security can do? are perhaps the most prevalent

type of rogue security software.

They mimic legitimate antivirus

programs and often display fake

security alerts, warning users of

non-existent threats on their

systems.
Fake System Optimizers: These Fake Firewall Programs: These

rogues claim to optimize system rogues pretend to be firewall software,

performance by cleaning up junk claiming to protect users from

files, fixing registry errors, and unauthorized network access and

improving system speed. However, malware attacks. In reality, they may

they often exaggerate or fabricate do nothing to safeguard the system

issues to convince users to and may even introduce

purchase the full version of the vulnerabilities.

software.
Fake Browser Security

Extensions: Some rogue Ransomware Disguised as Security

security software manifests as Software: Certain ransomware strains

pose as legitimate security software,


browser extensions or add-ons,
displaying intimidating messages
promising to enhance web
claiming that the user's files are
browsing security. However,
encrypted due to security issues.
they may actually monitor users'
They demand payment for decryption,
browsing activities, inject which may not even occur after
advertisements, or redirect payment.

traffic to malicious websites.


Fake System Cleaners:
Rogue Registry Cleaners: They claim
These rogues promise to
to repair and optimize the Windows
clean up and optimize users'
registry, but in reality, they may cause
systems but may actually damage to the registry or introduce

delete critical system files or malicious code.

introduce malware onto the

system.
Fake Security Suites: These

rogues mimic comprehensive

security suites, claiming to

provide antivirus, firewall, anti-

spyware, and other security

features. However, they often

lack genuine security

capabilities and may even

compromise system security.


Protecting yourself from rogue
HOW TO
PROTECT security software requires a
YOURSELF IN combination of vigilance,
ROGUE SECURITY
SOFTWARE?
skepticism, and proactive
security measures. Here are
some tips to help you
Use Reputable Antivirus Software: Install
and regularly update reputable antivirus or
anti-malware software on your computer.
Ensure that it's from a trusted vendor and
set it to automatically update virus
definitions and security patches.
Exercise Caution Online: Be wary of
unsolicited pop-up ads, emails, or
websites that claim your computer is
infected or at risk. Avoid clicking on
suspicious links or downloading
software from untrustworthy sources.
Educate Yourself: Learn to recognize the
signs of rogue security software, such as
aggressive pop-up messages, scare
tactics, and prompts to purchase
unnecessary software. Stay informed
about common cybersecurity threats and
tactics used by cybercriminals. Keep Software Updated: Regularly
update your operating system, web
browser, and other software
applications to patch known security
vulnerabilities. Enable automatic
updates whenever possible to ensure
you're protected against the latest
Enable Browser Security Features: Use
built-in browser features, such as pop-up
blockers and safe browsing modes, to
help prevent rogue security software from
infiltrating your system via malicious
websites or ads. Verify Software Authenticity: Before
downloading or purchasing security software,
research the product and its developer to
ensure legitimacy. Read reviews from
reputable sources and look for certifications
or endorsements from trusted organizations.
Back Up Your Data: Regularly back up
your important files and data to an
external storage device or cloud service.
In the event of a malware infection or
system compromise, you can restore your
files without having to pay ransom or rely
on potentially unreliable security software. Use a Standard User Account: Avoid
using an administrator account for
everyday tasks, as this can limit the
damage that rogue security software
can do if it infects your system.
Reserve administrative privileges for
tasks that require them, such as
Be Skeptical of Free Offers: Exercise
caution when encountering offers for free
security software or system optimization
tools, especially if they seem too good to
be true. Free software may come with
hidden costs or security risks.
Report Suspicious Activity: If you
encounter rogue security software or
suspect that your computer may be
infected, report it to your antivirus
vendor, relevant authorities, or a
trusted IT professional for assistance.
THANK YOU

GROU
P-2
members: Sharina tolentino
Charlyn balateria

You might also like