Saturday, September 15

Some of the Famous Trojans of All Time

A Trojan horse , or Trojan , is a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Trojans do not attemptto inject themselves into other files like a computer virus . Trojan horses may steal information, or harm their host computer systems.

                                               





Beast is a Windows-based backdoor Trojan horse sitting invisibly in an infected computer and this program gives full control of that computer.


> NetBus is a Windows GUI Trojan program and is similar in functionality to Donald Dick. It adds the Registry key
HKEY_CURRENT_USER\NetBus Server and modifies the HKEY_CURRENT_USER\NetBus Server\General\TCPPort key.
If NetBus is configured to start automatically, it adds a Registry entry called NetBus Server Pro in HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\RunServices.



> SubSeven is a Trojan that can be configured to notify a hacker when the infected computer connects to the Internet and can tell the hacker information about the system. This notification can be done over an IRC network, by ICQ, or by email. SubSeven can cause a system to slow down, and generates error messages on the infected system.


> CyberSpy is a telnet Trojan that copies itself into the Windows system directory and
registers itself in the system Registry so that it starts each time an infected system is rebooted. Once this is done, it sends a notice via email or ICQ and then begins to listen to a previously specified TCP/IP port.


> Subroot is a remote administration Trojan that a hacker can use to connect to a victim system on TCP port 1700.


> LetMeRule! is a remote access Trojan that can be configured to listen on any port on a target system. It includes a command prompt that an attacker uses to control the target system. It can delete all files in a specific director, execute files at the remote host, or view and modify the Registry.


> Firekiller 2000 disables antivirus programs and software firewalls. For instance, if Norton AntiVirus is in auto scan mode in the Taskbar, and AtGuard Firewall is activated, the program stops both on execution and makes the installations of both unusable on the hard drive. They must then be reinstalled to restore their functionality. Firekiller 2000 works with all major protection software, including AtGuard, Norton AntiVirus, and McAfee Antivirus.

Hope you liked the post and found it informative. If you have any doubt, pass on the comments.
Thanks

No comments:

Post a Comment

Enter your Comment...