You are on page 1of 37

Presentation

E-tech
Charlyn balateria
sharina tolentino
WHAT IS TROJAN HORSE ?
WHAT IS TROJAN HORSE ?
A Trojan Horse Virus is a type of malware that
downloads onto a computer disguised as a
legitimate program. The delivery method
typically sees an attacker use social
engineering to hide malicious code within
legitimate software to try and gain users'
system access with their software.
WHAT TROJAN HORSE CAN DO?
WHAT TROJAN HORSE CAN DO?
Trojans are malware, and like most forms of
malware, Trojans are designed to damage files,
redirect internet traffic, monitor the user's
activity, steal sensitive data or set up backdoor
access points to the system.
HOW DO TROJAN HORSE WORK?
HOW DO TROJAN HORSE WORK?
Unlike computer viruses, a Trojan horse cannot
manifest by itself, so it needs a user to download
the server side of the application for it to work.
This means the executable (.exe) file should be
implemented and the program installed for the
Trojan to attack a device’s system.
TROJAN HORSE
TROJAN HORSE
the Trojan was developed by computer
programmer John Walker in 1975, according to
Fourmilab.
Most Common Types of Trojan Malware
16 type's of trojan malware

Banker Trojan: Downloader Trojan


A banker Trojan is designed to target Downloader Trojan: A downloader Trojan
users’ banking accounts and financial targets a computer that has already been
information. It attempts to steal account infected by malware, then downloads and
data for credit and debit cards, e- installs more malicious programs to it. This
payment systems, and online banking could be additional Trojans or other types
systems. of malware like adware.
.

Backdoor Trojan:
A backdoor Trojan enables an attacker to gain remote access to a Distributed denial-of-service (DDoS) Trojan:
computer and take control of it using a backdoor. This enables the These Trojan programs carry out attacks that overload a network
malicious actor to do whatever they want on the device, such as with traffic. It will send multiple requests from a computer or a group
deleting files, rebooting the computer, stealing data, or uploading of computers to overwhelm a target web address and cause a denial
malware. A backdoor Trojan is frequently used to create a botnet of service.
through a network of zombie computers.
Fake antivirus Trojan: Instant messaging (IM) Trojan:
A fake antivirus Trojan simulates the This type of Trojan targets IM services to
actions of legitimate antivirus software. steal users’ logins and passwords. It
The Trojan is designed to detect and targets popular messaging platforms such
remove threats like a regular antivirus as AOL Instant Messenger, ICQ, MSN
program, then extort money from users Messenger, Skype, and Yahoo Pager.
for removing threats that may be
nonexistent.
.

Exploit Trojan:
An exploit malware program contains code or data that takes Game-thief Trojan:
advantage of specific vulnerabilities within an application or Game-thief Trojan: A game-thief Trojan is specifically designed to
computer system. The cyber criminal will target users through a steal user account information from people playing online games.
method like a phishing attack, then use the code in the program to
exploit a known vulnerability.
.
Mailfinder Trojan: Remote access Trojan
A mailfinder Trojan aims to harvest and Similar to a backdoor Trojan, this strand of
steal email addresses that have been malware gives the attacker full control of a
stored on a computer. user’s computer. The cyber criminal
. maintains access to the device through a
remote network connection, which they
use to steal information or spy on a user.

Infostealer Trojan:
This malware can either be used to install Trojans or prevent the user Ransom Trojan:
from detecting the existence of a malicious program. The Ransom Trojans seek to impair a computer’s performance or block
components of infostealer Trojans can make it difficult for antivirus data on the device so that the user can no longer access or use it. The
systems to discover them in scans. attacker will then hold the user or organization ransom until they pay
. a ransom fee to undo the device damage or unlock the affected data.
SUNBURST:
The SUNBURST trojan virus was released on numerous SolarWinds
Orion Platform. Victims were compromised by trojanized versions
of a legitimate SolarWinds digitally signed file named:
Short message service (SMS) Trojan:
SolarWinds.Orion.Core.BusinessLayer.dll. The trojanized file is a
An SMS Trojan infects mobile devices and
backdoor. Once on a target machine, it remains dormant for a
is capable of sending and intercepting
two-week period and will then retrieve commands that allow it to
text messages. This includes sending
transfer, execute, perform reconnaissance, reboot and halt system
messages to premium-rate phone
services. Communication occurs over http to predetermined URI's.
numbers, which increases the costs on a
user’s phone bill.
.
.

Rookit Trojan:
A rootkit is a type of malware that conceals itself on a user’s Spy Trojan:
computer. Its purpose is to stop malicious programs from being Spy Trojans are designed to sit on a user’s computer and spy on their
detected, which enables malware to remain active on an infected activity. This includes logging their keyboard actions, taking
computer for a longer period. screenshots, accessing the applications they use, and tracking login
. data.
.
How To Recognize a
Trojan Virus
How To Recognize a
Trojan Virus
A Trojan horse virus can often remain on a device for months
without the user knowing their computer has been infected.
However, telltale signs of the presence of a Trojan include
computer settings suddenly changing, a loss in computer
performance, or unusual activity taking place. The best way to
recognize a Trojan is to search a device using a Trojan scanner or
malware-removal software.
How To Protect Yourself from
Trojan Viruses
How To Protect Yourself from
Trojan Viruses
A Trojan horse virus can often remain on a device for months without the user knowing
their computer has been infected. However, telltale signs of the presence of a Trojan
include computer settings suddenly changing, a loss in computer performance, or
unusual activity taking place. The best way to recognize a Trojan is to search a device
using a Trojan scanner or malware-removal software.
Example of Trojan Horse Virus
Attacks
Trojan attacks have been responsible for causing major damage by infecting computers and stealing user data. Well-known examples of Trojans
include:

①Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool—which enables an attacker to use a device to mine
cryptocurrency—to infect devices.
②Tiny Banker: Tiny Banker enables hackers to steal users’ financial details. It was discovered when it infected at least 20 U.S. banks.
③ Zeus or Zbot: Zeus is a toolkit that targets financial services and enables hackers to build their own Trojan malware. The source code uses
techniques like 3.form grabbing and keystroke logging to steal user credentials and financial details.
NEXT TOPIC
WHAT IS RAOUGE SECURITY
SOFTWARE?
WHAT IS RAOUGE SECURITY
SOFTWARE?
Rogue security software is a form of malicius software and internet
fraud that misleads users into believing there is a virus on thier
computer and iams to convince them to pay for a fake malware removal
tool thst actually installs malware on their computer. It is a form of
scareware that manipulates user through fear, and a form of
ransomware. Rogue security software has been a serious security threat
in desktop computing since 2008. An early example that gained infamy
was SpySheriff and its clones, such as Nava Shield
Two Form In Rouge Security Software
Two Form In Rouge Security Software

Malware - attacks can crack weak passwords, bore deep into systems, spread
through networks, and disrupt the daily operations of an organization or
business. Other types of malware can lock up important files, spam you with
ads, slow down your computer, or redirect you to malicious websites.

Internet fraud - The term 'internet fraud' refers to any type of fraud scheme
that uses email, web sites, chat rooms or message boards to present fraudulent
solicitations to prospective victims, to conduct fraudulent transactions or to
transmit the proceeds of fraud to financial institutions or to others connected
with the scheme.
THANKYOU
FOR LISTENING TO US
Reporter:sharina tolentino & charlyn balateria Date:1/3/2024
NOW GO GET A
1/2 CROSSWISE
1/2 CROSSWISE CHA?
:yes maam & sir
1/2 crosswise po
1.WHAT IS SMS STAND FORM?
2.WHAT YEAR THEY INVENTED
THE TROJAN HORSE?
3.WHAT IS DDOS STAND
FORM?
4.WHO INVENTED THE TROJAN
HORSE?
5.WHAT IS IM STAND FORM?
6,7,8.GIVE ME THE TREE
EXAMPLE OF TROJAN HORSE
ATTACK?
9.Rogue security software has
been a serious security threat
in desktop computing since
____?
10. fix the word
-
rotanj srhoe
11to20.Can you give me the a
10 of the type's of trojan
malware?
yes dear anyorder kapag may mali sa spealing wrong
MY PRIZE

Yong prize
20-16 secret prize
15-1 candy

You might also like