Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The six main types of Trojan horse payloads are:

  • Remote Access
  • Data Destruction
  • Down loader
  • Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
  • Security software disabler
  • Denial-of-service attack (DoS)

Some examples of damage are:

  • Erasing or overwriting data on a computer
  • Trojan Horse repeatedy keeps returning no matter what on the victim's computer
  • Encrypting files in a cryptoviral extortion attack
  • Corrupting files in a subtle way
  • Upload and download files
  • Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context
  • Showing fake downloads of software movies, games, porn videos and porn websites, that you did not download nor go on.
  • Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
  • Spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'
  • Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
  • Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
  • Making screenshots
  • Logging keystrokes to steal information such as passwords and credit card numbers
  • Phishing for bank or other account details, which can be used for criminal activities
  • Installing a backdoor on a computer system
  • Opening and closing CD-ROM tray
  • Playing sounds, videos or displaying images.
  • Calling using the modem to expensive numbers, thus causing massive phone bills.
  • Harvesting e-mail addresses and using them for spam
  • Restarting the computer whenever the infected program is started
  • Deactivating or interfering with anti-virus and firewall programs
  • Deactivating or interfering with other competing forms of malware
  • Randomly shutting off the computer
  • A virus

Enter your email address to get free software's windows and virus removal tricks: SMS Alerts: Get news headlines on your mobile phone for freeMOBILE ALERTS

0 comments

Post a Comment

Blog Widget by LinkWithin

Like us on FaceBooooooook

About author

Vishnu vardhan Reddy Boda is Tech Blogger and Software Engineer.

know more about vishnu

https://lh4.googleusercontent.com/q2EaqwepJo0OtbCcx0m8EsvdQ6ZtQhIOlewtuCQK6ApuIixCHsfJO0Yqa7_Mkfr66fAxVcMnlm5JXXaYVoEoR2FTkA=s512twitter Pictures, Images and PhotosPhotobucketPhotobucket

Recently Digged Indanam (fuel)

Get our posts as email

http://lh6.ggpht.com/_s0ANCL8E8sQ/SY7SyZ6WkXI/AAAAAAAAAhg/-qr1lvldUdA/Newspaper_Feed_128x128newcopy-1.png Sign up for our daily email newsletter

Dont miss any thing Enter your email address:

SMS Alerts: Get news headlines on your mobile phone for free