You’re likely familiar with the Trojan Horse. If you paid attention to your literature class, you should be. According to Homer’s Odyssey, the horse was a phony gift that Agamemnon’s troops cooked up so they could infiltrate the city of Troy. Once inside the walls, troops hidden inside the horse’s belly sprung out and laid waste to the city.
There’s a similar threat involving computers. It’s aptly named, too: the Trojan Horse virus. Computer Repair 911, along with other businesses in the same line of work, has faced this very threat numerous times. Here’s a look at whether this old, but effective, digital threat means business or not.
How Dangerous Can Trojans Get?
Trojans can fleece millions of dollars, given the right circumstances. A virus called the “Zeus Trojan” managed to steal over $1 million from a British financial institution. Web security firm M86 came across this Trojan after gaining access to Moldova’s (an eastern European country) command and control server.
Over 37,000 computers were affected in the U.K. by the Zeus Trojan. And all of this happened via an unknown download that took the back door into a potential host. A compromised site houses the Trojan. Upon visiting, users receive the virus in the form of cookies. It can also be disguised as an authentic-looking add-on on the site.
How Do They Work?
Trojans work like their mythological namesake. They open secret portals into a computer, making it vulnerable to further threats or data theft. Trojan-infected systems are vulnerable to spying. It’s because of keyloggers, software that record what’s being typed using the keyboard. Keyloggers can send to the Trojan’s creator/s whatever it is they've recorded. It can be account numbers, passwords, usernames, or anything else related.
Signs of a Trojan infection are often easy to identify. If the system is constantly receiving false notifications of threats, applications still pop up somewhere else even after uninstallation, and blue screens of death (BSODs) are common. Be on the lookout for extremely unrelated links, suspicious programs, or files you didn’t even download as well. This makes it easy to prevent a Trojan infection: just refrain from visiting or clicking anything on a suspicious-looking website.