Trojan Horses and Backdoors  

Trojan Horses and Backdoors

      Trojan Horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and cause harm, for example, ruining the file allocation table on the hard disk. ATrojan Horse mayget widelyredistributed as part of a computer virus. The term Trojan Horse comes from Greek mythology about the Trojan War.

Some typical examples of threats by Trojans are as follows

1. They erase, overwrite or corrupt data on a computer.

2. They help to spread other malware such as viruses (by a dropper Trojan).

3. They deactivate or interfere with antivirus and firewall programs.

4. They allow remote access to your computer (by a remote access Trojan).

5. They upload and download files without your knowledge.

6. They gather E-Mail addresses and use them for Spam.

7. They log keystrokes to steal information such as passwords and credit card numbers.

8. They copy fake links to false websites, display porno sites, play sounds/videos and display images.

9. They slow down, restart or shutdown the system.

10. They reinstall themselves after being disabled.

11. They disable the task manager.

12. Theydisablethecontrol panel.

Backdoor

   A backdoor is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a backdoor so that the program can be accessed for troubleshooting or other purposes.

Following are a few examples of backdoor Trojans:

1. Back Orifice: It is a well-known example of backdoor Trojan designed for remote system administration. It enables a user to control a computer running the Microsoft Windows OS from a remote location. The name is a word play on Microsoft BackOffice Server software. Readers may visit http://www.cultdeadcow.com/tools/bo.html to know more about backdoor.

2. Bifrost: It is another backdoor Trojan that can infect Windows 95 through Vista. It uses the typical server, server builder and client backdoor program configuration to allow a remote attacker, who uses client, to execute arbitrary code on the compromised machine.

3. SAP backdoors: SAP is an Enterprise Resource Planning (ERP) system and nowadays ERP is the heart of the business technological platform. These systems handle the key business processes of the organization, such as procurement, invoicing, human resources management, billing, stock management and financial planning.

4. Onapsis Bizploit: It is the open-source ERP penetration testing framework developed by the Onapsis Research Labs. Bizploit assists security professionals in the discovery, exploration, vulnerability assessment and exploitation phases of specialized ERP penetration tests. Readers may visit http://www.onapsis.com/research.html to know more about this tool.

How to Protect from Trojan Horses and Backdoors

Follow the following steps to protect your systems from Trojan Horses and backdoors:

1. Stay away from suspect websites/weblinks: Avoid downloading free/pirated software’s that often get infected by Trojans, worms, viruses and other things.

2. Surf on the Web cautiously: Avoid connecting with and/or downloading any information from peer-to-peer (P2P) networks, which are most dangerous networks to spread Trojan Horses and other threats.

3. It may be experienced that, after downloading the file, it never works and here is a threat that although the file has not worked, something must have happened to the system the malicious software deploys its gizmos and the system is at serious health risk.

4. Install antivirus/Trojan remover software: Nowadays antivirus software(s) have built-in feature for protecting the system not only from viruses and worms but also from malware such as Trojan Horses.

Posted on by