All you need to know about the threat of Trojans

25 August 2016

”Oversharing on networking sites such as google hangouts leave 30% of users vulnerable to cybercrime…”

Unfortunately, any connected device operating in the digital world is increasingly vulnerable to cyber attackers.

A recent scam involving Google hangouts, found that hackers have attempted to install malware on computer, android and apple devices by creating a feature that is included in google hangouts. The strategy is reported to have been used in the form of an email that asks users to download a video conferencing service as a part of google hangouts.

Sadly, once the innocent users had fallen into the attacker’s trap, the malware attempted to download a file which contained Trojan.

What is a Trojan?

A Trojan is a form of malware that is usually disguised as legitimate software to encourage users to click.  Usually employed by hackers, their aim is to gain complete access to user’s systems in order to spy, steal and obtain any sensitive data that may be stored within the computer database.

The popularity of Trojans has boomed and cyber criminals are using them more now than ever. The versatility of Trojans allows them to become unnoticed, affecting innocent users and allowing cyber criminals to gain complete access to the computer.

”27 million different types of malware were reported in 2015 – 21% of these were Trojans”

After a Trojan has been effectively installed on your computer, cyber criminals have full access to your system and activities normally include:

–          Deleted data

–          Copying data

–          Disruption of computer networks

–          Blocking data

The effect on you…

Through misleading intent and being disguised as harmless, Trojans have the capacity to cause severe damage to your digital devices.  Unfortunately, most Trojans are designed to specifically trick users into using them. Convincing language is used to entice users into downloading the ‘proposed’ updates or software: – the most common strategy in social engineering.

At least 26% of users said they do not hesitate when opening a link that they are unaware of or do not understand.

There is an array of different Trojans that can attack your computer and each are classified in terms of their performance;

–          Back door – This type of Trojan gives malicious users control over the infected device. Things such as; sending, receiving, launching and tampering with files are capable in this Trojan. Most commonly implemented for criminal purposes.

–          Trojan banker – Malware that is designed to attack online banking systems in the pursuit of account information for debit and credit cards.

‘’In 2015, there were nearly 2 million attempts to steal money online through hacked access to bank accounts’’ (Kaspersky)

–          Trojan FakeAV – These programs stimulate antivirus software. The aim of this Trojan is to request money from users in return for removal of proposed threats that don’t even exist.

–          Trojan Ransom – Specifically focusing on data within the computer, this Trojan attacks the user’s capability of be able to access certain information and databases on their network. Money is often demanded from cybercriminals in order to give users their access back.

–          Trojan IM – software that steals logins and passwords for networks such as instant messaging, msn messenger and skype.

A need to protect yourself from Trojans…

It is imperative to carry out the basic, necessary procedures in order to protect your digital device from the threat of a Trojan. A rigorous anti-malware software will prevent Trojan attacks on your computer or smartphone.

Some ways to defend against Trojans;

–          Use of a security conscious internet service provider (IPS)
An IPS contains powerful anti-spam and anti-phishing elements.

–          Automatic Windows updates
Regular updates to keep the network up-to-date and exempt from any vulnerabilities regarding Trojans.

–          Latest version of your browser
Downloading the latest version of your browser will enable regular updates for the best technologies in order to filter out phishing sites that contain Trojans.

The threat of malware and Trojans is a growing concern in the digital world with an ever increasing amount of devices vulnerable to cyber attackers because of their connectivity to the internet. The basic steps listed above can minimise the potential, quite significantly, of your computer network being vulnerable to the threat of a Trojan.

Need more information on the threat of Trojans?
Don’t hesitate to contact us here at IntaForensics. We are more than happy to help with any cyberattack or fear that you may have. Our specifically designed packages resolve most cyber issues with ease. Contact us on 0247 771 7780 or visit our website for more information www.intaforensics.com.

Talk to our consultation team today

Contact Us

I can honestly say that your excellent customer service and communication has made our forensic instructions to you exceptionally easy. I am very conscious of the amount of time I must have taken up with various queries, requests, and then changed requests but you have always been very patient, polite and extremely helpful.

Case Review Manager - Criminal Cases Review Commission