Introduction
The question that comes to mind is what is Trojan horse? Trojan horse is stated to be a malicious program that looks harmless however, it is used to hack into people’s computers. The term Trojan horse is derived from Trojan War a Greek mythology (Christensson, 2006). The myth talks about the wooden horse that was pulled by the people from Troy. The legend claims that inside the horse there were Greek soldiers in it who emerged at night and seized the city. This fact can be observed from the program where a person installs the application unaware that it is malware. The program is usually found when a person decides to download software such as games. A person will not be able to know that inside the game downloaded there was malware. The repercussion of the Trojan horse can be experienced once the program has entered the computers. The program executes its intended function in the computer. Therefore, it can attack anything in the computer thereby, causing it to shut down. Hence, the Trojan horse can be stated to be similar to a virus. However, this type of virus is not similar to a true virus that occurs in the human body. Malware is not able to replicate itself inside the computer or propagate itself (Erbschloe, 2005). The reason is stemmed from the fact that a user will not be able to tell that they have installed the virus. The security devices for the computer relies on the antimalware software's that will be able to detect the virus and try to isolate it from other programs therefore, making it easy to remove. There are many effects of the Trojan horse malware in the computer systems. Some of this effects are nonreversible and therefore, can cause the computer to shut down completely.
Effects of the Trojan horse
There are many repercussions of the Trojan horse malware in the computer machine. One of the common indications that a Trojan malware is present in the computer system is that the computer experiences changes that were not present before any installation of a program. The repercussions of the Trojan malware are classified into different categories (Beal, 2006).
Backdoor
This types of Trojan horse malware are used to provide an unauthorized user remote control over people’s computers. It is stated that when a person has installed the malware in the computers it provides unauthorized access for the remote user to do as they wish with the infected computer. This fact enables the remote users to receive, send, delete files, rebooting the computer and displaying data. According to research conducted, it has been found that backdoor Trojan are used for criminal activities. The remote users unite the victim computers thereby, forming a zombie network used to do crimes.
Rootkit
These kinds of malware are designed in the manner in which it hides other malware programs in the computer system. Therefore, it can be stated that the primary function of the malware is to ensure that malicious programs can be able to run for a longer period in the computer. This will affect the functioning of some of the programs on the computer (Beal, 2006).
Exploit Trojans
This kind of applications in the PC system is used to pursue any vulnerability of the operating systems and software that has been installed. It has been stated that the central purpose for doing this action is for malicious intent by the remote users or criminals.
Trojan banker
Trojan bankers are formulated with the intent of stealing people's account data especially for the online banking, credit card information and e-payment systems. The criminals can access people's banking information which they use to steal people’s money from their accounts leaving others penniless. Many individuals in the society will claim that this kind of act is very malicious because it involves people’s livelihood.
Trojan dropper
It has been observed that these types of programs are created by hackers with the intent of installing viruses as well as to prevent people from detecting any malicious programs on the infected computer. Research shows that not many antivirus software’s can be able to detect this malicious malware (Beal, 2006). Therefore, many people whose computers have been infected will not be able to fight the Trojan malware and thus could cause the computer to shut down or freeze.
Trojan DDoS
This program is called the denial of service malware. It has been formulated to attack against a target web address. This fact is done through sending information from a person’s computer to other infected computers. The action will bring about an attack that will overwhelm the target address of a certain computer. Therefore, the result of the attack will cause a denial of service. These actions are usually –performed by criminals especially if they do not want their web addresses to be located when committing a crime. Most of the criminals using this type of malware are terrorists and hackers. When the government cannot trace web addresses, it could cause the nation to be vulnerable to attacks. An example of a Trojan DDOS can be found in the case of Regina v Aaron Caffrey that occurred in 2003. According to the case, it claims that Caffrey had launched a denial of service program against the computers of the Port of Houston (Jay, 2015). This action caused the computers of the port to freeze thereby causing the functions of the Port to be halted. Caffrey claimed that Trojan horse was installed in his computers to frame him for this offense. He did not deny that he was a hacker in real life. The testimonies proved to be true thus causing the case to be terminated.
Trojan downloader
The Trojan downloaders are applications that have been formulated to download or install any new malicious program into a person’s computer. Some of those new programs can be Trojans or adware. This programs could cause the computer processing to be slow or some of the programs could be deleted (Jay, 2015).
Trojan spy
These types of programs are formulated in a manner in which it would spy on a person’s computer. Therefore, it will be able to detect what a person is doing on the internet, and the computer.it is also able to identify any data entered using the keyboard. This fact means that a person’s privacy will be violated, and therefore, one cannot be able to perform their functions with the computer with ease. These programs might be used by criminals especially those who are trying to hack into the files of the government or musicians (Jay, 2015). This fact will cause them to know everything about the user of the infected computer.
Trojan fake AV
Trojan fake AV is malicious programs designed to convince users of infected programs that their computers contains numerous viruses or other complications. The initial function for doing this action is to extort money from users by telling them that they have better antivirus software’s. Research shows that in many situations the viruses stipulated by the programs are usually fake (Erbschloe, 2005). However, it has been discovered that the biggest problem for the computers is the FakeAv programs. The programs install a virus in the computer and thus causes it to shut down.
Trojan-Ransom
This types of applications blocks or modifies data that is on the computer. The main reason for this is to cause the computer not to work properly or cause some certain files not to be accessed (Idziorek, D2013). This actions will disrupt a person’s work. This kind of deed is usually performed by criminals who request payment or ransom from the user of the computer. If the payment is not made then, it could cause a person to lose their files that had been blocked. For one to get the data back, it means that one has to be able to get the approval of the criminal.
Trojan game thief
People who are addicted to online games are at a risk of getting this kind of program. The malware steals gamer’s information including their bank accounts (Erbschloe, 2005). This fact could cause the players to lose their money without providing any bank information to others.
Trojan-IM
This kind of programs steals people’s passwords and login information’s especially from the instant messaging programs. Examples of these programs are MSN Messenger, Skype and Yahoo pager. In this types of hacking, a person’s personal messages and emails will be read by unknown individuals or criminal. Therefore, a person’s rights of privacy will be violated (Jay, 2015).
Trojan-SMS
These types of programs are used to infiltrate the phones of individuals which could end up costing the user a lot of money. A person will be able to send text messages from your phones to those that use premium rate. It can be observed that sending messages to premium rate phone numbers is very expensive in that the criminal will be hacking other people’s phones so as to save their phone bills (Idziorek, 2013).
Punishment for the creators of Trojan horse malware
There are cases where some of the creators of horse Trojan malware have been arrested. An example could be the case of Lewys Martin, a British nationalist who was caught for cybercriminal activities (Cluley, 2012). He distributed Trojan horse to the online gamers and therefore, was able to gain access to their bank account information. Evidence was found in his computer and thus was sentenced to eighteen months in prison. In using this example it proves that any person who is caught spreading or creating Trojan horse will be apprehended for cybercrimes.
How to recover from a Trojan horse malware
Research shows that any person in the world is capable of getting the malware. The reason could be stemmed from the fact that there are different types of malware effects. According to the criminal justice system, there are ways that a person can be able to recover from the malicious programs (Erbschloe, 2005).
Disconnect computer from the internet
It is highly recommended that whenever a person has detected that their computer system has malicious programs to disconnect immediately from the web. The reason for doing this act is because a person can be able to stop any Trojan malware from completely installing on the computer. Another fact is that an individual may gain access to an individual’s personal information. Once the internet has been disconnected, there is a possibility that the hackers will not be able to obtain access to a person’s computer and files (Jay, 2015).
Call IT support
People are encouraged to seek the guidance of the IT support department. It is important to contact them as soon as any malware is detected in the computer systems. This fact could prevent the Trojan from spreading throughout the computer. The IT Company will also be able to contact the cybercrime officers if the Trojan proves to be risky for the safety of people and their finances (Cupa, 2013).
Scan computer system
When a malicious program has infected the computer, it is important for the user to scan the machine. Scanning of the machine should be done through live CD. Another method of scanning will be through the web-based virus removal service. Research shows that it is important to install an antivirus program especially from uncontaminated source, for example, the CD-ROM (Jay, 2015). However, if a person’s computer system does not have this tool, then they can use other programs on the computer that has not been infected. It is important to scan the computer system thoroughly. When scanning the malicious program could be detected, and most antivirus programs will help to eradicate the Trojan. Once the malware has been removed from the computer, it is crucial that a person takes precautionary steps to ensure that their computers do not get another Trojan horse program.
Back up important files
Once a malicious file has been detected in the computer people are encouraged to have a backup plan of saving their necessary files. If some of the files such as documents, photos or videos are not infected a person should burn them onto a CD or DVD or store them in other devices used for storage (Idziorek, 2013). People are advised to be careful with the files from the infected computer. The reason is rooted from the fact that there is a possibility that some of the data could be infected. Therefore, many people claim that it is important always to save files on an external storage device because it will come in handy if a person’s computer becomes infected.
Reinstall operating system
There are instances when the anti-virus software is unable to locate the malware, and therefore, they cannot remove it. The smartest move for such situations is to change the computers format by reinstalling new programs on the PC (Erbschloe, 2005). When this happens, a person runs the risk of losing all their important files and documents stored on the computer. However, by reinstalling it helps the computer to get rid of all the Trojan horse malware that was corrupting the computer. It is stated that before reinstalling the computer systems, it is encouraged that the users should be able to make notes on all the files and programs that had previously existed in the computer machine. An antivirus software should be reinstalled to help prevent similar malware problems from recurring. When a person is restoring the files that had been transferred to an external storage device, it is vital that they should be properly scanned before using them.
Protecting computers
It is recommended that any internet users should take precaution to prevent malware from infecting their computers. People are advised not to open unsolicited attachments that are usually put in emails. These emails are stated to contain Trojan horse malware in them. The antivirus software’s should always be updated for it to be able to scan all the files on the computer. Research shows that it is important to use internet firewall (Idziorek, 2013). This FACT will prevent a person from using unsolicited links. One of the most important things that people should be aware of is that they need to ensure that the web browsers they are using are secured.
Conclusion
Trojan horse is one the most common types of malware downloaded on the computers. This malware has many repercussions for the PC. Backdoor Trojan causes the remote control user to be able to have access to an infected computer. This fact makes it possible for a criminal to be able to have access to files, documents, videos, and photos of someone. Trojan bankers enable criminals to gain access to people's bank account information which they use to steal people’s money. Hackers have been able to connect their computers with several other infected computers to block any access to their web address. Most of the time this kind of actions are conducted by terrorists or cyber criminals. Some people use the Trojan horse malware to block access to files or documents for others. The purpose for doing this action is to ensure that the individual whose files have been blocked pays ransom to gain access to their computers files. Some criminals use the computer systems to spy on people. Therefore, it can be stated that the Trojan horse is designed in a manner in which whatever a person does to the infected computer or types in the keyboard other people will be able to gain access for criminal use. In looking at all these repercussions, it proves that it is important for a person to be vigilant when using computers and not enter unsolicited links or emails. They should also update their antivirus software regularly.
Reference
Baczewski, P. (2000). E-mail virus protection handbook: Protect your e-mail from Trojan horses, e-viruses and mobile code attacks. Rockland, MA : Syngress Publ. .
Beal, V. ( 2016, March 14). The Difference Between a Computer Virus, Worm and Trojan Horse. . Retrieved from http://www.webopedia.com/DidYouKnow/Internet/virus.asp
Christensson, P. (2016, March 13). Trojan Horse Definition. Retrieved from http://techterms.com
Cluley, G. (2012, May 17). Call of Duty Trojan horse creator ends up in jail, after drunken college raid. Retrieved from Naked Securiy by Sophos: https://nakedsecurity.sophos.com/2012/05/17/call-of-duty-trojan-horse-jail/
Cupa, B. (2013). Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware). LISS.
Erbschloe, M. (2005). Trojans, worms, and spyware: A computer security professional's guide to malicious code. . Amsterdam: Elsevier Butterworth Heinemann.
Idziorek, D. J. (2013). Computer Security Literacy: Staying Safe in a Digital World. CRC Press.
Jay, J. (2015). Computer Forensics. Burlington: Johns and Bartlett Learning.
McAfee Security Advice Center. (n.d.). Retrieved March 14, 2016, from http://home.mcafee.com/advicecenter/?id=ad_vp_damatht