The After-Effects Of A Trojan Horse Attack

Asked By 40 points N/A Posted on -
qa-featured

How badly does a Trojan Horse effect the device which it enters? Does the extent of the attack remain same on all computers or does it vary from PC to PC?

SHARE
Answered By 10 points N/A #182074

The After-Effects Of A Trojan Horse Attack

qa-featured

Hi

The damage done by a Trojan Horse varies depending upon what damage it’s been written to do. It can be programmed to cause any extent of harm on the PC like creating a backdoor on your system, allowing cybercriminals to control your PC, etc. It is even capable of disabling the anti-virus software and hence, it is difficult to detect a Trojan Horse virus. Some Trojans are capable of monitoring keyboard activity while others look into the internet usage and collect personal information. Other Trojans install n=botnet software.

Answered By 590495 points N/A #182075

The After-Effects Of A Trojan Horse Attack

qa-featured

When a computer is infected with a Trojan horse, the effects can be very dangerous considering their development or evolution in the last years. The primary objective of this type of virus is to install other programs on the infected computer. They do this so that the infected computer can be controlled from a remote computer. Trojans don’t spread just by themselves.

Like what their name suggests, like what the wise Greeks did when they attack Troy, Trojans reach other computers by disguising as a harmless program which, in several cases, when executed releases a second program which is the Trojan itself. At present, the fraction of malware traffic represented by the Trojans around the world is worm, 14.04 percent. The effects of Trojans can be extremely dangerous.

They can obliterate information or files on the hard drive similar to what viruses can do. They can also seize and send again classified data to open communication ports or external address, permitting an intruder to remotely control the computer. Furthermore, Trojans can capture keystrokes or even record passwords entered by the user.

Trojan horses were originally designed to bring about as much damage as possible to the affected machine. They were intended to eliminate system files and format drives though they were not usually noticed. Because during those times malware programmers were finding to cause widespread epidemics but the problem is, Trojans cannot spread by themselves. An example of this is the Autorooter.

Related Questions