11
TROJAN HORSE VIRUS

Torjan horse virus

Embed Size (px)

Citation preview

Page 1: Torjan horse virus

TROJAN HORSE VIRUS

Page 2: Torjan horse virus

CONTENTS :-

VIRUS TROJAN HOURSE PURPOSE AND USAGE CURRENT USAGE COMMON TROJANS HORSE RECENT INNOVATION IN TROJAN SECURITY FROM TROJAN PROJECT INFORMATION

Page 3: Torjan horse virus

WHAT IS VIRUS ???? ...

A computer virus is a computer program that replicate itself and spread from one computer to another.

The term "virus" is also erroneously, used to refer types of malware, including adware and spyware programs that don’t replicate .

Malware (malicious software) are used disrupt computer operation, gather sensitive information, or gain access to pc’s systems.

Many active malware threats are trojans or worms than viruses. Trojan horses and worms are confused with viruses.

Page 4: Torjan horse virus

TROJAN HORSE

The term is derived from Greek mythology .

Trojans are non-self-replicating type of malware which appears to perform a desirable function.

Instead it facilitates unauthorized access to the user's computer system.

Do not attempt to inject themselves into other files like computer virus.

Trojans may use drive-by downloads or install via online games ,internet-driven applications

In order to reach target computers.

Page 5: Torjan horse virus

PURPOSE AND USAGE Trojan can hacker remote access to targeted

computer system. Operations that could be performed by a hacker on

a targeted computer system may include: Use of the machine as part of a botnet. Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card

information) Installation of software, including third-party

malware and ransomware Downloading or uploading of files on the user's

computer Modification or deletion of files Keystroke logging Watching the user's screen

Page 6: Torjan horse virus

CURRENT USAGE

Botnets popularity and availability of advertising services permit authors to violate their users' privacy.

Trojan horses are becoming more common. survey conducted by BitDefender (2009) "Trojan-type

malware are 83-percent of the global. spreads with help of worms and travel across the

internet with them. main purpose to make host system open to access

through the internet. BitDefender states approximately 15% of computers

are members of a botnet (Trojan infection)

Page 8: Torjan horse virus

RECENT INNOVATION IN TORJANS

its code takes advantage of a security flaw of Internet Explorer and Google Chrome .

use host computer as an anonymizer proxy to hide internet usage.

hacker can view internet sites tracking cookies, internet history, any IP logging.

host's computer may show the internet history using effected computer as proxy.

Newer generations of Trojans tend to "cover" olders tracks leaving tracks on viewed page.

the most widely distributed eg such type of Trojan horse are SUB7.

Page 9: Torjan horse virus

SECURITY FROM TORJANS

Use good antivirus Always scan files emails before

opening to your system Trojans can be far more harmful than

viruses, Use trojans controllers. Never open scam emails. Delete .exe files not from authorized

sites.

Page 10: Torjan horse virus

TROJAN PROJECT INFORMATION

Our project describes working of a simple trojan.

This trojan crupts window os . It places junk file in c drive to fill

hardisk space Its undetected by antivirus Damage can be restore by deleting .dll

file from c drive.

Page 11: Torjan horse virus

THANK YOU

ANY QUERIES???...