Advance Cyber Security: Topic Trojan horse (computing) | hackin5min.com

Advance Cyber Security: Topic 
Trojan horse (computing)🔰🔰


In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

https://missioniteducation.blogspot.com

The term Trojan horse stems from Greek mythology. According to legend, the Greeks built a large wooden horse that the people of Troy pulled into the city. During the night, soldiers who had been hiding inside the horse emerged, opened the city's gates to let their fellow soldiers in and overran the city.

 🔰🔰Uses of a Trojan horse🔰🔰

When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:

🔺Give the attacker backdoor control over the computing device.

🔺Record keyboard strokes to steal the user's account data and browsing history.

🔺Download and install a virus or worm to exploit a vulnerability in another program.

🔺Install ransomware to encrypt the user's data and extort money for the decryption key.

🔺Activate the computing device's camera and recording capabilities.

🔺Turn the computer into a zombie bot that can be used to carry out click fraudschemes or illegal actions.

🔺Legally capture information relevant to a criminal investigation for law enforcement.




 Very Important Part
   🔰🔰How a Protect From Trojan horse 🔰🔰

The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.

⚓Don't Open unknown or spam emails

Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.
⚓Don't use Restricted Sites 

The malicious code resides undetected until a specific date or until the victim carries out a specific action, such as visiting a banking website. At that time, the trigger activates the malicious code and carries out its intended action.
⚓Close Your Open Ports 

Depending upon how the Trojan has been created, it may delete itself after it has carried out its intended function, it may return to a dormant state or it may continue to be active.

 Share and support me ❤❤


DONATE VIA PAYPAL Support Your Brother | God Gaves You Alot | Contibute To Community https://www.hackin5min.com/. Jai Hind.
Newer Posts Newer Posts Older Posts Older Posts

More posts

Comments

Post a comment

Are You CyberSafe ?

Be CyberSafe