Rootkit Trojans -These Trojans are intended to prevent the discovery of malware already infecting a system so that it can affect maximum damage.īanker Trojans -This type of Trojan specifically targets personal information used for banking and other online transactions.ĭistributed Denial of Service (DDoS) Trojans - These are programmed to execute DDoS attacks, where a network or machine is disabled by a flood of requests originating from many different sources.ĭownloader Trojans -These are files written to download additional malware, often including more Trojans, onto a device. Some of the most common types of Trojan virus include:īackdoor Trojans - This type of Trojan allows hackers to remotely access and control a computer, often for the purpose of uploading, downloading, or executing files at will.Įxploit Trojans -These Trojans inject a machine with code deliberately designed to take advantage of a weakness inherent to a specific piece of software. Are you prepared for today’s attacks? Discover the year’s biggest cyber threats in our annual Threat Report. Like the wooden horse used to sack Troy, the "payload" carried by a Trojan is unknown to the user, but it can act as a delivery vehicle for a variety of threats. A Trojan, or Trojan horse, is a type of malware that conceals its true content to fool a user into thinking it's a harmless file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |