Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

2022- 2023

BRANCH :- COMPUTER TECHNOLOGY


SUBMITTED :- Mrs Meeta Fadanvis
TOPIC :- Study On Trojan Horse Virus
GROUP MEMBER :- SUMIT SHARMA (01)
SAKSHI CHAHANDE (19)
AISHWARYA BRAHMAPURIKAR (06)
PARIKSHIT DATIR (36)
INTRODUCTION
The current world has entered into information time with
the development of computer network, while internet has
become indispensable in life, work, and study. However, the
virus attack becomes increasingly popular because of the
development and strengthening of internet. Various attack
methods greatly threat the property security of human
beings. Trojan horse virus is one of the major methods of
network Therefore, we have to make study to know more
fundamental knowledge, communication methods, and work
process to take precautionary measures to further enhance
the network protection and construct harmonious network
environment
TROJAN HORSE VIRUS

The full name of horse virus is “Trojan horse” which is a novel


network attack program at present. It is remote control-based
software controlling the other computer based on a specific
program. With its implantation function or the characteristic of
accessory with carrying virus, this virus can enter into user’s
computer to steal personal information and password, tamper
data, or destroy files [1]. Trojan horse virus can be controlled by
attacker to do the command, so the computer system may be
destroyed because of their illegal operation. Trojan horse is
extremely dangerous because hostile attacker can control user
computer with the virus in distance
to steal or viciously revise files, spy system information, steal
various commands and passwords, and even format users’
hardware. In addition, Trojan horse virus usually records keyboard
operation by means of keyboard record, and then obtains the
account and password of E-bank. Attackers can directly steal
users’ wealth by obtaining accounts and passwords. On the other
hand, Trojan horse can also cause the native machine be affected
by other vicious virus.

HOW IT GOT INSTALLED?


Typically, the Trojan horse is hidden in an innocent-looking email
attachment or free download. When the user clicks on the email
attachment or downloads the free program, the malware hidden
inside is transferred to the user's computing device. Once inside,
the malicious code can execute whatever task the attacker
designed it to carry out.
EFFECTS OF TROJAN HORSE VIRUS
1.KEYLOGGING
Once it's in your system, a popular trick of a Trojan Horse is
to implement a "keylogger" program. Such programs register which
buttons and keys you press on your keyboard, and send a report of
them to the hacker.
The target of these hackers is your personal--usually
financial—information
2.DATA CORRUPTION
Some particularly malicious Trojan Horses are programmed to
attack their victim's computer
The Trojan could corrupt very delicate data at the core of your
operating system, causing everything from minor glitches to an
operating system crash
The hackers who create these Trojans seem to be interested in
vandalism--the wanton, malicious destruction of another person’s
property.
3. REMOTE ACCESS (BACKDOOR)
The final--and possibly most detrimental--version of the
Trojan Horse is one that installs a remote access program to your
computer, also known as a "backdoor."This backdoor gives the
hacker access to your computer system, allowing her to peruse,
change, or delete your personal files at her leisure
PROTECTION FROM VIRUS
• Never download or install software from a source you don’t trust
completely
• Never open an attachment or run a program sent to you in an
email from someone you don’t know. 
• Keep all software on your computer up to date with the latest
patches
• Make sure a Trojan antivirus is installed and running on your
computer
EXAMPLE OF TROJAN VIRUS
• Bitfrost, a remote access Trojan (RAT) that infected
Windows clients by changing, creating and altering
components.
• Tiny Banker, which allowed attackers to steal sensitive
financial information. Researchers in the Center for
Strategic and International Studies Security Group
identified "Tinba" in 2012 after two dozen major U.S. banks
were infected.
• FakeAV Trojan, which embedded itself in the Windows 
system tray and continuously delivered an official-looking
pop-up window, alerting the user to a problem with the
computer. When users followed directions to fix the
problem, they actually downloaded more malware.

You might also like