A few days ago I explained what a Trojan is but did you know that there are 5 6 distinct types of this nuisance?
Each serves a different purpose and some may have more than one of the following functions, or will facilitate the downloading of further Trojans onto your system.
I was originally going to detail 5 types of Trojan but a sixth emerged just over 24 hours ago.
Here are the various types of Trojans that you want to be avoiding –
1. THE REMOTE ADMINISTRATOR TROJAN
A remote administration variety of Trojan gives the hacker behind it a great level of control over the victim’s computer.
Typically, they will be able to function without being detected and will facilitate certain functions such as modifying the registry, uploading and downloading files, running files and even initiating and intercepting various types of communication between the PC and the outside world.
2. THE FILE SERVING TROJAN
The file server trojan creates a file server on the victim’s computer.
This server, which is typically configured as an FTP server, will allow the hacker to monitor network connections and to have sufficient control to be able to upload and download their own files.
Often this ability to upload files will lead to the more powerful administrator Trojan, as above, being installed,
File server Trojans are usually very small files, possibly less than 10 kilobytes in size, meaning they are easily disguised, attached to emails or discreetly connected to other files.
One of the ways in which file serving Trojans are distributed is via those funny forwarded messages you receive from your friends.
Another means of distribution is with small downloadable games, so be careful of both of those.
3. DDOS TROJANS
The DDoS Trojan is key to ensnaring computers into a botnet.
Large numbers of machines are tricked into installing the DDos (Distributed Denial of Service) Trojan and then the hacker can control one, some or all of those machines remotely via a client which communicates with a master server.
Through this primary machine in their zombie network the hackers can direct attacks at specific companies, computers or websites.
By bombarding the target server with traffic they can bring it to its knees, effectively making it unavailable to genuine users.
DDoS attacks are often directed at famous brands and those behind them may make financial demands in order to cease their activity.
4. KEYLOGGING TROJANS
Keylogging Trojans utilise spyware in order to record everything that a user types on their machine.
All their keystrokes are logged and recorded and, when the hacker makes a request, are then emailed onto them via the Trojan.
Whilst there may be many uses for the information that these Trojans grab, it will almost certainly be for the hacker’s financial benefit, either through some sort of card fraud or, worse, via identity theft.
5. THE PASSWORD STEALING TROJAN
The fifth type of Trojan is the sort that will attempt to steal your passwords.
They will use your email to communicate any passwords they discover back to the hacker.
Again, this type of information will typically be used for theft as many people will only be using passwords in association with their bank accounts or credit cards.
6. THE SYSTEM KILLING TROJAN
Just a couple of days ago a new breed of Trojan emerged.
This new threat, known as Trojan.Killfiles.904 is not designed to spy on you or steal your money.
Instead, its sole purpose appears to be the destruction of your data.
Quite what the motivations behind it are I do not know but its certainly something you want to be avoiding!
Do you have any questions about Trojans, or are there any other types that I’ve missed?