Once a Trojan or Trojan horse has found a way onto your computer, it can unleash a variety of different payloads, much like a computer virus. There are different types of Trojan that each of them has an especial kind of attack. These attacks range from harmless to destructive, including:
- Displaying taunting or annoying messages
- Wiping out data
- Stealing information, such as a password
- Placing a virus or another Trojan horse on your computer
- Allowing remote access to your computer
To help Trojan horses avoid detection, many hackers simply rename the Trojan horse file. While this won’t fool an antivirus program or a Trojan horse detector, a simple name change is often enough to trick an unsuspecting user into running the Trojan horse.
The Trojan horse is one of the popular choices for cyber criminals. It tricks the endpoint users into downloading or opening the Trojan horse without realizing it’s a threat to their cyber security. Only a few people can recognize a Trojan at first glance. As it disguises itself as a legitimate file or program that you actually want to be on your endpoint.
Different Types of Trojan
A Trojan horse isn’t just a single type of virus. It also varies to its purpose. The cyber criminal can target a specific person or disseminate the Trojan horse of his choice everywhere. This list will make you understand the different types of Trojan horses and what do they do.
1. Backdoor Trojan
This is one of different types of Trojan. It can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device.
It gives malicious users remote access over the infected computer. They can do whatever they want such as sending, receiving, launching and deleting files, displaying data and rebooting the endpoint.
2. Distributed Denial of Service (DDoS) attack Trojan
This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others. Not only it can affect endpoints, but also websites. By sending multiple requests – from your computer and several other infected computers – the attack can overload the target address which leads to a denial of service.
3. Downloader Trojan
This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware.
4. “Fake AV Trojan” One of Multiple Types of Trojan
This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they are real or fake. Trojan-FakeAV programs copies the activity of antivirus software. They are created to extort money from you. In return, they will remove the detection and threat removal. Even though, the threats that they report are don’t actually exist.
5. Game-thief Trojan
The losers here may be online gamers. This Trojan seeks to steal their account information. If you are into gaming, you know that online gaming can also garner loads of cash. Cyber criminals also crafted this Trojan virus which steals user account information from online gamers.
6. Infostealer Trojan
As it sounds, this Trojan is after data on your infected computer. it can spy on how you are using your computer. For example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
7. Mailfinder Trojan
This Trojan seeks to steal the email addresses you have accumulated on your device.
8. “Ransom Trojan” One of Different Types of Trojan
This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance. The cyber criminal will demand a ransom. They will only replace your computer’s performance or unblock your data, after you have paid them.
9. Remote Access Trojan
This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.
10. Rootkit Trojan
A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device. This can effectively prevent malicious programs being detected.
11. “SMS Trojan” One of Different Types of Trojan
This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs. This Trojan can change data on your endpoint. This can lead to endpoint malfunction. The cyber criminal will demand a ransom. They will only replace your computer’s performance or unblock your data, after you have paid them.
12. Trojan banker
This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data.
14. Trojan IM
This Trojan targets instant messaging. It steals your logins and passwords on IM platforms.
15. “Trojan Joke” One of Different Types of Trojan
A joke Trojan causes no damage but may play an annoying sound from your computer’s speaker, warp the appearance of your computer screen, or display a taunting message on the screen, such as “Now formatting hard drive!” Although irritating and unwanted, joke Trojan horses are harmless and easily deleted.
16. NVP Trojan
NVP Trojan is a Macintosh Trojan horse that modifies the system file so that when the user types any text, the vowels (a, e, i, o, and u) fail to appear. To entice victims to run this Trojan horse, the NVP Trojan masquerades as a utility program that can customize the look of the computer display.
17. IconDance Trojan
The IconDance Trojan minimizes all application windows and then starts rapidly scrambling all the desktop icons. Beyond scrambling your desktop icons, it does nothing more than make you take the time to reorganize your Windows desktop.
18. Destructive Trojans
A destructive Trojan can either wipe out your hard drive or selectively delete or modify certain files. Although these are the most dangerous Trojans, their very nature tends to limit their spread: In the process of attacking your computer, they reveal their presence, often by displaying a taunting message on the screen. And, if they reformat your hard drive, they also wipe themselves out.
The only warning you may have that you’ve been hit by a destructive Trojan may be a blinking light or grinding noise from your hard disk. By the time you notice this suspicious sound, at least some of your files will likely already be wiped out.
19. “Feliz Trojan” One of Multiple Types of Trojan
When the Feliz Trojan runs, it displays the image shown in Figure 8-1. If the victim clicks the Exit button, a series of message boxes appears, warning the user not to run programs. At the end, the program displays a message wishing the user a Happy New Year.
While the program displays its message boxes, it deletes the core Windows files, thus preventing the computer from rebooting.
20. AOL4Free Trojan
In 1995, a Yale student named Nicholas Ryan wrote a program called AOL4FREE, which allowed users access to America Online without having to pay the normal subscriber fee. Immediately following news of the AOL4FREE program, someone started a hoax, warning that the AOL4FREE program was actually a Trojan horse:
Anyone who receives this [warning] must send it to as many people as you can. It is essential that this problem be reconciled as soon as possible. A few hours ago, someone opened an Email that had the subject heading of “AOL4FREE.COM”. Within seconds of opening it, a window appeared and began to display all his files that were being deleted. He immediately shut down his computer, but it was too late. This virus wiped him out.
Inevitably, someone actually wrote a Trojan horse, called it AOL4FREE, and on March 1997, began distributing it to America Online users by email. Attached to the email message was the archive file named AOL4FREE.COM, which claimed to provide the original AOL4FREE program for allowing access to America Online for free.
Once executed, the Trojan wipes out every file from your hard drive and then displays “Bad Command or file name” along with an obscene message.
How to Secure Yourself from Different Types of Trojan?
We will always preach the basic of security online. Though, that’s all up to you if you’ll practice safety. We’re still here to guide you on further steps on how to fully stay safe from Trojan viruses. Just follow the tips in here:
Use “Antivirus” to be Protected Against Different Types of Trojan
An effective antivirus can alert you when there’s a suspicious file on your endpoint. You can start using free branded antivirus offered in the Internet. A Trojan can also take a form of an antivirus, so trusting a branded antivirus can also keep you away from the danger.
Up-to-date Security Software
What’s the use of antivirus when it’s outdated? Update them when the updates are ready. It’ll upgrade the software for better virus mitigation.
Avoid Malicious Websites
These spread the danger among the community of Internet users. Malicious websites mostly have pop-up messages that can trick you. Better stay out of trouble.
Ignore Unknown Emails
When you receive an email from an unknown sender, you can just ignore them and delete them. Trojans also take the form of an email attachments.
Confuse your enemies. Your difficult, creative passwords can save you from a big mess. So try to create strong passwords.
Use “Firewalls” to Avoid Different Types of Trojan
A firewall monitors and controls incoming and outgoing network traffic on a standardized security rules. This another protection for your own good.
The Last Words about Different Types of Trojan
Trojan horse viruses can act various preset tasks by a cyber criminal. It’s better to know which Trojan horse virus you might encounter to prepare a security plan. Never cyber criminals take advantage of the things you worked hard for.