The document discusses a study on the Trojan horse virus conducted by a group of students. It provides an introduction to Trojan horse viruses, explaining that they allow remote control of infected computers and can steal personal information. The document then describes how Trojan horses are installed, their effects like keylogging and data corruption, examples of Trojan viruses, and recommendations for protection.
The document discusses a study on the Trojan horse virus conducted by a group of students. It provides an introduction to Trojan horse viruses, explaining that they allow remote control of infected computers and can steal personal information. The document then describes how Trojan horses are installed, their effects like keylogging and data corruption, examples of Trojan viruses, and recommendations for protection.
The document discusses a study on the Trojan horse virus conducted by a group of students. It provides an introduction to Trojan horse viruses, explaining that they allow remote control of infected computers and can steal personal information. The document then describes how Trojan horses are installed, their effects like keylogging and data corruption, examples of Trojan viruses, and recommendations for protection.
SUBMITTED :- Mrs Meeta Fadanvis TOPIC :- Study On Trojan Horse Virus GROUP MEMBER :- SUMIT SHARMA (01) SAKSHI CHAHANDE (19) AISHWARYA BRAHMAPURIKAR (06) PARIKSHIT DATIR (36) INTRODUCTION The current world has entered into information time with the development of computer network, while internet has become indispensable in life, work, and study. However, the virus attack becomes increasingly popular because of the development and strengthening of internet. Various attack methods greatly threat the property security of human beings. Trojan horse virus is one of the major methods of network Therefore, we have to make study to know more fundamental knowledge, communication methods, and work process to take precautionary measures to further enhance the network protection and construct harmonious network environment TROJAN HORSE VIRUS
The full name of horse virus is “Trojan horse” which is a novel
network attack program at present. It is remote control-based software controlling the other computer based on a specific program. With its implantation function or the characteristic of accessory with carrying virus, this virus can enter into user’s computer to steal personal information and password, tamper data, or destroy files [1]. Trojan horse virus can be controlled by attacker to do the command, so the computer system may be destroyed because of their illegal operation. Trojan horse is extremely dangerous because hostile attacker can control user computer with the virus in distance to steal or viciously revise files, spy system information, steal various commands and passwords, and even format users’ hardware. In addition, Trojan horse virus usually records keyboard operation by means of keyboard record, and then obtains the account and password of E-bank. Attackers can directly steal users’ wealth by obtaining accounts and passwords. On the other hand, Trojan horse can also cause the native machine be affected by other vicious virus.
HOW IT GOT INSTALLED?
Typically, the Trojan horse is hidden in an innocent-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out. EFFECTS OF TROJAN HORSE VIRUS 1.KEYLOGGING Once it's in your system, a popular trick of a Trojan Horse is to implement a "keylogger" program. Such programs register which buttons and keys you press on your keyboard, and send a report of them to the hacker. The target of these hackers is your personal--usually financial—information 2.DATA CORRUPTION Some particularly malicious Trojan Horses are programmed to attack their victim's computer The Trojan could corrupt very delicate data at the core of your operating system, causing everything from minor glitches to an operating system crash The hackers who create these Trojans seem to be interested in vandalism--the wanton, malicious destruction of another person’s property. 3. REMOTE ACCESS (BACKDOOR) The final--and possibly most detrimental--version of the Trojan Horse is one that installs a remote access program to your computer, also known as a "backdoor."This backdoor gives the hacker access to your computer system, allowing her to peruse, change, or delete your personal files at her leisure PROTECTION FROM VIRUS • Never download or install software from a source you don’t trust completely • Never open an attachment or run a program sent to you in an email from someone you don’t know. • Keep all software on your computer up to date with the latest patches • Make sure a Trojan antivirus is installed and running on your computer EXAMPLE OF TROJAN VIRUS • Bitfrost, a remote access Trojan (RAT) that infected Windows clients by changing, creating and altering components. • Tiny Banker, which allowed attackers to steal sensitive financial information. Researchers in the Center for Strategic and International Studies Security Group identified "Tinba" in 2012 after two dozen major U.S. banks were infected. • FakeAV Trojan, which embedded itself in the Windows system tray and continuously delivered an official-looking pop-up window, alerting the user to a problem with the computer. When users followed directions to fix the problem, they actually downloaded more malware.