HOW TROJAN WORM ATTACKS || VIRUS WORKS
Advance Cyber Security: Topic
Trojan horse (computing)🔰🔰
https://missioniteducation.blogspot.com
The term Trojan horse stems from Greek mythology. According to legend, the Greeks built a large wooden horse that the people of Troy pulled into the city. During the night, soldiers who had been hiding inside the horse emerged, opened the city's gates to let their fellow soldiers in and overran the city.
🔰🔰Uses of a Trojan horse🔰🔰
🔺Give the attacker backdoor control over the computing device.
🔺Record keyboard strokes to steal the user's account data and browsing history.
🔺Download and install a virus or worm to exploit a vulnerability in another program.
🔺Install ransomware to encrypt the user's data and extort money for the decryption key.
🔺Activate the computing device's camera and recording capabilities.
🔺Turn the computer into a zombie bot that can be used to carry out click fraudschemes or illegal actions.
🔺Legally capture information relevant to a criminal investigation for law enforcement.
Very Important Part
🔰🔰How a Protect From Trojan horse 🔰🔰
The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.
⚓Don't Open unknown or spam emails
Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.
⚓Don't use Restricted Sites
The malicious code resides undetected until a specific date or until the victim carries out a specific action, such as visiting a banking website. At that time, the trigger activates the malicious code and carries out its intended action.
⚓Close Your Open Ports
Depending upon how the Trojan has been created, it may delete itself after it has carried out its intended function, it may return to a dormant state or it may continue to be active.
Share and support me ❤❤
Post a Comment