We always hear about a virus call Trojan or Trojan Horse in our computer. Why is this virus been called Trojan or Trojan Horse, how it got in the computer and what it can do?
Why it's name is Trojan Horse?
The origin of Trojan Horse is from Greek tale which is the tale about the Trojan War. In Greek mythology, the Trojan War was waged against the city of Troy by the Achaean (Greeks) after Paris of Troy took Helen from her husband Menelaus, King of Sparta. The war between city of Troy and Achaean goes around 10 years.
On the tenth years, the Achaean create a strategy that will help them win the war. Their strategy is create a large wooden horse at the beach and hide one platoon of men in it and the rest of the men will sail away to a safe distant. This strategy is been done at night. When the people of Troy wake up in the morning, they saw a big wooden horse at the beach and there is no Achaean people there. People of Troy were happy that they thought they have won the war and they bring the wooden horse into their city as a trophy.
During the night after the people of Troy has asleep, the men that hide in the wooden horse came out and the rest of the men that sail away return with night as their cover. The men that was hide in the wooden horse open the gate to the city from the inside so that the rest of the forces can barge in and conquer the city. The people of Achaean have won the war by using this strategy and so the wooden horse been name Trojan Horse.
|
Pic 1: Trojan Horse from the tale of Trojan War |
How it got in the computer?
The Trojan virus will looks like the things that we want it. For example, the file that we download from the Internet. The reason why we accept to download this file is because that it has the similar name of the things that we want to download. For example, we would like to download an applications such as calculator. Because of the same name, we will have no suspicion to the application and run it. Once we have run the application, then it will start its works.
What the virus can do?
Trojan virus will attack the computer will become the cause of loss of data, possible system harm and others. While the Trojan virus is doing its attack, the performance of the computer will be slow and easily to overheat. Once the virus has got to the system file, the computer will no longer be able to be use by us which is the user. It is because that the operating system software will lose the data that they need to run the Windows. When this has occur, the computer will be needed to be formatted and reinstall the operating system software such as Windows.
The symptoms of computers that has been infected with Trojan Horse virus:
- Easily to crash, Blue Screen of Death (BSoD)
- Data Corruption
What the hackers can do with the computers that infected with Trojan Horse virus:
- Formatting disks
- Electronic money theft
- Infects entire Network and other connected devices
- Data theft, including confidential files, sometimes for industrial espionage, and information with financial implications such as passwords and payment card information
- Modification or deletion of files
- Downloading or uploading of files for various purposes
- Downloading and installing software, including third-party malware
- Keystroke logging
- Watching the user's screen
- Viewing the user's webcam
- Controlling the computer system remotely
- Encrypting files; a ransom payment may be demanded for decryption, as with the CryptoLocker ransomware
- System registry modification
- Using computer resources for mining cryptocurrencies
- Linking computer to botnet
- Using the infected computer as proxy for illegal activities and/or attacks on other computers.
|
Pic 2: How the virus got in |
This Trojan Horse virus can be detected with anti-virus that has been updated. If the anti-virus still at old version, the virus definition is still the old one and it will not found the Trojan Horse virus, so it is crucial to update the anti-virus regularly.