IEEE BYTE VOLUME-3 ISSUE-1 | Page 6
1
Trojan Horses: The trojan malware is named after the wooden horse used by the Greeks to
infiltrate Troy. It is a harmful piece of software that looks legitimate.
● Users are tricked to load and run it on their systems.
● It disguises itself as a harmless software for your
computer system but never runs the disguise. Instead, after it is
activated, it can achieve any number of attacks on the host.
Trojans spread actions like opening an e-mail attachment or
running a file downloaded from the Internet. Trojans cannot
spread on their own without interaction unlike worms.
Spywares & Adwares : Spyware downloads onto your computer
without leaving any trace of being downloaded and steals data.
Adware displays advertisements with the help of cookies or
spyware
●
Spyware is used to illegitimately collect information while installing and running the
program.
● Adware mostly latches onto movie, gaming and other entertainment based downloads.
Adwares are easier to catch and can easily be flushed out using defenders and anti virus
softwares Spyware are comparatively difficult.
Ransomware : If you see this screen that warns you that
you have been locked out of your computer until you pay
for your cybercrimes, your system is severely infected with
Ransomware.
●
Ransomware blocks the victim’s access to his/her
files, and the only way to regain access to the files
is to pay a ransom.
● Ransomware usually finds its access to other
computers through worms and botnets.
When a system is infected, a pop up window appears, prompting you to pay to recover all your
files within certain number of days, with a countdown timer your window. It adds conditions like,
if you fail to pay within that time, the fee will be doubled or you will lose your files forever.
Rootkit: Rootkits are a concealment technique by hackers and frauds. They are designed to
permit the other information gathering malware in to get the information from your computer
without you realizing anything is going on.
●
●
They modify a host’s system to keep files like spyware or viruses from being read.
They are also a form of backdoor computing which allows for the bypassing of
information. In turn, these backdoors can install even more backdoors to permit more
illegal activity.
It is the hardest of all Malware to detect and therefore to remove; many experts recommend
completely wiping your hard drive and reinstalling everything from scratch.