Within the entire web, different types of programs and different types of technologies used to harm or defraud the user coexist. Trojans are one of the most widely distributed copies and the one with the most variants. The specific names that each one of them adopt usually creates confusion for the user, who ends up mistakenly identifying them under the general name of “virus”.

There are many, and when I say many are MANY !! Types of toyans and we will see some of these to know what they do and what they are based on.

Trojans Variants

▸Backdoor Trojan: This type of Trojan enables an unconventional access channel in the system allowing other malware and / or malicious persons to enter it without problems.

▸Trojan Drooper: It is characterized by executing other malicious code at the time of its execution.

▸Trojan Keylogger: In this case, the Trojan is in charge of monitoring and recording everything that is typed with the keyboard. It is clearly aimed at the theft of confidential information. Some of them have the ability to take screenshots.

Banking Trojan: Refers to those that help in the execution of phishing attacks. In many cases, they modify the contents of the hosts file on Windows systems. This technique is called local pharming.

▸Trojan Downloader: These malicious codes are responsible for downloading other malicious codes while they are active.

▸Bot Trojan: The main function of this type of Trojan is to turn a computer into a zombie. Each of these zombie computers will be part of botnet networks.

When it comes to dealing with these, it is very important to know them thoroughly since that can be the difference in eliminating it and that the virus is successful, even so, never underestimate the Trojans and their variants since they can be very dangerous.


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *