Data theft using Trojans

Mutt

Professional
Messages
1,458
Reaction score
1,072
Points
113
Contents
  • 1. Features of Trojans
  • 2. Countermeasures

Trojans are a type of spyware that collects and transfers confidential user information to a third party (usually the Trojan's author) in disguise. Such information may include passwords for logging into payment accounts, confidential personal information, bank card details, passport details, and much more. At the same time, the Trojan program is not viral, does not multiply over the network, does not harm the computer, i.e. does not spoil files and does not disable equipment (viruses can too!).

Features of Trojans
The goals of creating this category of malicious software are purely practical - data theft using Trojans (logins and passwords, keys and ciphers, codes and numbers). The behavioral algorithm of a virus software is similar to the actions of a street bully-bully destroying everything that comes to hand. As for the Trojan program, it is a kind of "saboteur in ambush" waiting in the wings ... And then it methodically performs a certain set of actions, often unnoticed by the user.

You probably remember the Trojan horse from ancient Greek mythology, when the Danaans made a huge wooden statue and pretended to retreat. The Trojans dragged this horse to their city, but at night the Danaans hiding in the statue left it, killed the guards and opened the gates of the city to their army. So Troy was captured. As you can see, saboteur programs are similar to a Trojan horse, and it is after him that they are named Trojans.

What happens at the moment when the Trojan starts its work? The object of theft for the Trojan can be the username / password for the application, the credit card number and its other details, and the author of the malware usually acts as the beneficiary. However, it is not uncommon for a "Trojan" to be written to order for a one-time implementation of criminal intent.

The Trojan horse consists of two parts - a client and a server, the exchange of data between which occurs through any available port via the Internet protocol TCP / IP (less often - UPD and ICMP). The server part of the Trojan horse is installed on the computer of a potential victim, while the client part is located at the creator (or owner) of the Trojan. To disguise, Trojans have a name that is consonant with any of the "friendly" office programs, or their extension coincides with such popular extensions as: RAR, DOC, GIF, and others.

Here are just a few examples of some Trojans:
  • Trojan Maran.DJ (reads personal information from automatic input forms);
  • Nabload.CHW (comes as an attached file to an email from Gmail, reads email data);
  • Trojan.Mayachok (disrupts the work of the PC, generates a form for entering a phone number to send a paid SMS);
  • Trojan.ArchiveLock.20 (encrypts important files, and a form for transferring funds appears to unlock these files);
  • Android.SmsSend (a Trojan for Android OS that leads the user to send a paid SMS);
  • Duqu (the most "mysterious" Trojan of our time, written in an unknown programming language - according to Kaspersky Lab data. Created to steal information from Iranian government agencies).

Some malicious programs are installed on smartphones (no matter what operating system is based on: Android, iPhone or Windows) and can greatly harm its owner. For example, if a Trojan finds out that the phone is tied to a Sberbank bank card (by sending an SMS command from the Mobile Bank without your knowledge: find out the balance), it can secretly transfer all the money from your card account to the swindler's account. Moreover, you will not even see the confirmation SMS, they will be hidden from you by the Trojan.

Another option for sabotage is to intercept the details of your card (for example, when paying in an online store) and transfer funds from it quietly according to the above scheme.

You can see the classification of Trojans below.

GDE Error: Error while uploading file - Turn off error checking if necessary (403: Forbidden)

Countermeasures
Daily work at a computer, especially if several people are working at it, in itself carries the potential danger of "getting" a Trojan unnoticed. How can you recognize and neutralize a hidden but dangerous Trojan horse?

First, one should knowingly minimize (or eliminate altogether) the likelihood of getting it on a computer. As a common preventive method for MS Windows and other operating systems, a "firewall" is used (also known as a firewall or firewall), which monitors the traffic passing through itself and can impose restrictions on it or even block it (traffic filtering in accordance with the specified rules) ... Restricting outgoing or incoming traffic for questionable programs will significantly increase the security of your personal computer. Typically, a firewall notifies the user of an unauthorized attempt to transfer data from a particular program or application. And the user can prohibit sending (or receiving) data by clicking on the corresponding button of the firewall pop-up window, for example: "Deny outgoing traffic".

Secondly, it is worth taking more radical measures. An important component of protecting a personal PC from Trojan horses is an antivirus program with a built-in firewall. Popular antivirus software products have a rich set of tools for scanning your computer (and the network in general). Kaspersky Anti-Virus, Dr.Web and other equally well-known antiviruses, including free ones, have effective tools for detecting and combating Trojans.

Third. The software market offers many highly specialized scanners with constantly updated databases of potential threats to computer security. It is highly recommended to periodically run a scan for the presence of "Trojans" among the user's files, or add the corresponding task to the scheduler of your operating system.

It is also highly discouraged to disable the anti-malware tools integrated into the operating system. Of course, except when replacing the standard set of tools with an application program from a third-party anti-virus package.

Observing all of the above protection measures, you can hope that even the most "cunning" Trojan will not get on your computer. If this happens, it is worth contacting specialists to restore the computer's performance.
 
Top