How Do Trojan Horses Get on Your Computer?
By Allan Hu
Trojan horse viruses are files designed to trick computer users into thinking they are legitimate processes. For example, a Trojan might come in the form of a computer game downloaded from a hijacked website. However, the program often does nothing but assist unauthorized access to the host system. Hackers can use Trojans to steal person data, like passwords or credit card numbers. Unlike other computer viruses, Trojans do not replicate themselves.
Game Downloads
Trojan horses commonly infect a system through the facade of free game downloads. This is especially true of illegal downloads shared through peer-to-peer networks.
Email Attachments
Trojan horses can be disguised as legitimate email attachments. A hacker may send thousands of emails that appear to come from a trustworthy organization. The message encourages the recipient to open his attachment.
Web Browser Exploits
Trojan horses can get onto systems through browser vulnerabilities. For example, ActiveX controls are commonly uploaded to hacked websites in order to infect visitors. In most cases, user input is required for this to work. This means downloading and starting a program or plug-in.
Messaging Clients
Hackers may send files via instant messaging programs. The sender may say that a file is a picture of himself or some other legitimate document. The file, when opened, will infect the system with a Trojan horse.
Social Engineering
All Trojan horses are classified as social engineering ploys. In these schemes, users are tricked into believing a malicious program is legitimate. Users must open the files to infect their computers. So be careful with any unsolicited files you receive. Make sure that you have a good Internet security suite active at all times.
References
Writer Bio
Allan Hu has been writing since 2001 for several popular, self-owned websites like new-electronics.net and legitblogger.com. He is educated in clinical and psychoanalytic psychology, as well as marketing and advertising.