Types of Trojan Horse
Now there are many Trojans which is designed to perform specific functions. Some of them are: –
- Backdoor trojan: A trojan horse of this kind gives the attacker remote access to the compromised machine.
- Ransom trojan: This kind of trojan horse is intended to encrypt the data on the compromised system and then demand payment in exchange for its decryption.
- Trojan Banker: It is designed to steal the account data for online banking, credit and debit cards, etc.
- Trojan Downloader: It is designed to download many malicious files like the new versions of Trojan and Adware into the computer of the victims.
- Trojan Dropper: It is designed to prevent the detection of malicious files in the system. It can be used by hackers for installing Trojans or viruses on the victim’s computers.
- Trojan GameThief: It is designed to steal data from Online Gamers.
- Trojan I’s: It is designed to steal the data of login and passwords like: -a. skype b. yahoo pager and more.
Other Trojans can also be used like: -Trojan-notifier, Trojan-clicker, and more.
Trojan Horse in Information Security
Any malicious software intended to harm or exploit any programmable device, service, or network is referred to as malware. Malware includes computer viruses, worms, Trojan horses, ransomware, spyware, and other malicious programs. In this article we will understand about Trojan Horse virus.
Contact Us