![](https://static.wixstatic.com/media/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.jpeg/v1/fill/w_980,h_980,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/642e54_7fc4d1fbe92141b7a4085736c7fc21c8~mv2.jpeg)
What Are Trojans?
Trojans are a type of malicious code or software that may look safe to users to open. Trojans as stated are malicious, These scripts are written for many reasons such as, gaining access to the users machine.
Trojans are normally sent via email, disguised as maybe a work email with an attachment asking you to download it. Once you have downloaded, what you believee to been a safe file or software from your email has now given the hacker access to your machine.
Types Of Trojans
Backdoor Trojan This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device. Distributed Denial of Service (DDoS) attack Trojan This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others. Downloader Trojan This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware. Fake AV Trojan This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake. Game-thief Trojan The losers here may be online gamers. This Trojan seeks to steal their account information. Infostealer Trojan As it sounds, this Trojan is after data on your infected computer. Mailfinder Trojan This Trojan seeks to steal the email addresses you’ve accumulated on your device. Ransom Trojan This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance. Remote Access Trojan This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.
"It is common knowledge in the programmer's circle that almost every smartphone in the world is infected with some form of trojan." - Abhijit Naskar, Vatican Virus: The Forbidden Fiction
HASHTAGS
#hacking #hacker #cybersecurity #ethicalhacking #hackers #linux #programming #hack #technology #kalilinux #security #coding #infosec #tech #hackingtools #ethicalhacker #pentesting #cyber #malware #programmer #computerscience #cybercrime #cyberattack #informationsecurity #hacked #anonymous #cybersecurityawareness #coder
Comments