I’m dealing with Trojans!


While performing static analysis I learned that security vendors identified the files I am working with as Trojans. 

This made me wonder what a Trojan is and how it works. In this blog post I will share the information I have found regarding this.

Similar to its name a Trojan virus is software that fools users into thinking it is another software.

Interestingly enough it must be executed by a user for it to infect a machine. The virus creator tricks the user by having them interact with an email containing the virus, having them click on an advertisement, or having them click on a link. Once the virus has access to your machine it can do several things.

Backdoor Trojans allow others to access your computer. Downloader Trojans can download more malicious software onto your machine. DDos Trojans can use your computer among many others to flood a network with traffic. There are Trojans that masquerade as an antivirus program and try to trick you into providing your bank account information to fix your computer. Banker Trojans try to steal the banking information of users. 

In order to protect your computer from Trojans you must keep your systems updated. Users must also exercise caution when dealing with emails or links. When downloading software a user must only get files from safe sources. Make sure that files have the correct file extensions. For example, an audio file should not end in .exe. Always run an antivirus scanner on your machine and keep backups of your data. 

Source Cited

https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html

https://www.kaspersky.com/resource-center/threats/trojans

https://www.webroot.com/us/en/resources/tips-articles/what-is-trojan-virus

https://www.mcafee.com/blogs/internet-security/understanding-trojan-viruses-and-how-to-get-rid-of-them/

https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *