1 / 18

Trojan Horse Program

Trojan Horse Program. Presented by : Lori Agrawal. Agenda. What is Trojan Horse program? Who are the targets? How it gets spread? Impact of Trojan Horse Attack Control of hackers over files Ways to avoid this attack. Continue:. Detection of attack

shellyp
Download Presentation

Trojan Horse Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trojan Horse Program Presented by : Lori Agrawal

  2. Agenda • What is Trojan Horse program? • Who are the targets? • How it gets spread? • Impact of Trojan Horse Attack • Control of hackers over files • Ways to avoid this attack

  3. Continue: • Detection of attack • How to remove Trojan from system • Example: SubSeven • Capabilities of SubSeven Program • Parts of SubSeven • A real Trojan Horse Threat • Conclusion

  4. What is Trojan Horse Program? • Trojan Horse is one of the today’s most serious threat to computer security. • A malicious security-breaking program disguised as something benign. • A executable program • Once infected, it is controlled totally by a hacker.

  5. Who are the most targets? • The home computers • Reasons • Private Content • Availability • Defendless status

  6. How it gets spread? • Email attachments • Sending files in chat rooms • Infected computer can attack other computer

  7. Impact of Trojan Horse Attack • Complete access to victim’s system • Delete and alter files • Access to Administrator privileges • Other computer get infected • An infected computer can be targeted by any user.

  8. Control of hackers over files • Alter user’s private documents such as bank statement, credit card statement, password file, mortgage payments files. • Access files remotely as they own it • Access of chat history

  9. Ways to avoid this attack • Don’t download from unknown source • Need to be aware of hidden extension • Don’t use automatically get file feature • Don’t type a command or go to web site told by a stranger • Remove unnecessary services and file shares

  10. Detection of attack • Hard to detect whether a computer is infected or not • Not listed under process list of ALT+Ctrl+Delete key • To detect, one can scan his computer for open port

  11. How to remove Trojan from system • By getting clean re-installation • Anti-Trojan Software

  12. Example: SubSeven • Trojan Horse program that attacks computer running on Window 9.x platform. • More popular than other types as it provides more options.

  13. What SubSeven can do? • It can restarts Windows of Victim’s computer. • It can record sound files from microphone used on victim’s machine. • It can record video images from a video camera attached to the victim’s computer. • It can change desktop color, wallpaper and turn on and off the victim’s monitor. • It can open and close CD-ROM drive. • It can capture screen shots of user’s currently activity. • A new version of SubSeven also allow hackers to know whether a victim is presently online, a manager feature that can abort a program running on victim’s machine.

  14. Part of SubSeven: • SubSeven Server: Must run on victim’s computer. • Client Program: Used by hacker on his machine to connect to server(Victim’s computer). • Server Editor: An interface to Hacker to choose option how to get information from victim’s computer.

  15. A real Trojan Horse Threat • Targets were customer of Paypal’s online service • Spread using sending emails containing subject line “PAYPAL.COM NEW YEAR OFFER” • Emails contained information about payment discount • Create a fake Paypal web site and ask for credit card info.

  16. Conclusion • Serious network security problem • Once infected, computer is totally controlled by hacker. • Hard to detect whether a computer is infected or not. • Hard to recover.

  17. Any Questions?

More Related