Ultimate Pop Culture Wiki
Advertisement
File:Beast RAT client.jpg

Beast control program. Beast is a Windows-based backdoor Trojan horse sitting invisibly in an infected computer and this program gives full control of that computer.

In computing, Trojan horse, or Trojan, is a malicious computer program which is used to hack into a computer by misleading users of its true intent. It works in system’s background and performs harmful actions there. Having it installed on a system means a great security risk for one's PC and all the data, which is stored on it.[1][2][3][4][5]

Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers.Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers .

Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address). Also, Ransomware attacks—which blocks access to data or threatens to publish it until a ransom is paid—are usually carried out using a Trojan.[1][2][3][4][5]

Purpose and uses[]

  • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)
  • Crashing the computer
  • Computer running slow
  • Blue screen of death
  • Block any anti-virus program.
  • Block any installation process.
  • Electronic money theft[6]
  • Data theft (e.g. retrieving passwords or credit card information)
  • Installation of software, including third-party malware and ransomware
  • Downloading or uploading of files on the user's computer
  • Modification or deletion of files
  • Keystroke logging
  • Viewing the user's webcam
  • Anonymizing internet viewing

Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.[7]

A recent innovation in Trojan horse code takes advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide internet usage. A hacker is able to view internet sites while the tracking cookies, internet history, and any IP logging are maintained on the host computer. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Newer generations of the Trojan horse tend to "cover" their tracks more efficiently. Several versions of Slavebot have been widely circulated in the US and Europe and are the most widely distributed examples of this type of Trojan horse.[7]

Current use[]

Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world." This virus has a relationship with worms as it spreads with the help given by worms and travel across the internet with them.[8]

Their main purpose is to make its host system open to access through the internet.

BitDefender also states that approximately 15% of computers are members of a botnet - usually an effect of a Trojan infection.[9]

How to defend against[]

Common Trojan horses[]

  • Socket de Trois, Inactif (by Jc-zic, Cyberraider, bg45)
  • Netbus (by Carl-Fredrik Neikter)
  • Subseven or Sub7(by Mobman)
  • Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • DarkComet
  • The Blackhole exploit kit[10]
  • Flashback Trojan (Trojan.BackDoor.Flashback)
  • ProRat

See also[]

  • Computer security
  • Remote administration
  • Cyber spying
  • Dancing pigs
  • Exploit (computer security)
  • Industrial espionage
  • Malware
  • Principle of least privilege
  • Privacy-invasive software
  • Reverse connection
  • Ransomware (malware)
  • Rogue security software
  • Social engineering (security)
  • Spam
  • Spyware
  • Timeline of computer viruses and worms
  • Bundestrojaner

References[]

  1. Landwehr, C. E (1993). A taxonomy of computer program security flaws, with examples. DTIC Document. Retrieved 2012-04-05. Unknown parameter |coauthors= ignored (|author= suggested) (help)<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  2. "Trojan Horse Definition". Retrieved 2012-04-05.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  3. "Trojan horse". Webopedia. http://www.webopedia.com/TERM/T/Trojan_horse.html. Retrieved 2012-04-05. 
  4. "What is Trojan horse? - Definition from Whatis.com". Retrieved 2012-04-05.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  5. "Trojan Horse: [coined By MIT-hacker-turned-NSA-spook Dan Edwards] N." Retrieved 2012-04-05.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  6. http://www.h-online.com/security/news/item/Carberp-trojan-generated-Lb2-8-million-1477413.html
  7. 7.0 7.1 Jamie Crapanzano (2003): "Deconstructing SubSeven, the Trojan Horse of Choice", SANS Institute, Retrieved on 2009-06-11
  8. BitDefender.com Malware and Spam Survey
  9. Datta, Ganesh. "What are Trojans?". SecurAid.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  10. Burt, Jeffrey (2012-04-19). "HP: Fewer but More Dangerous Software Security Vulnerabilities". eWeek.com. Ziff Davis. Retrieved 2012-04-20. [...] Web exploit kits continued to be popular in 2011. HP pointed to the Blackhole Exploit Kit, which officials said is used by most hackers and hit an infection rate of more than 80 percent in late November 2011.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>

<templatestyles src="Refbegin/styles.css" />

External links[]

Template:Malware

Advertisement