Which of the following is a virus that masquerades as a legitimate application?
This page provides an overview of the most common malware applications. For specific steps you can take to protect against malware, see our Protect Against Viruses & Security Threats pages. Show
What is Malware?Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software. Once installed on your computer, these programs can seriously affect your privacy and your computer's security. For example, malware is known for relaying personal information to advertisers and other third parties without user consent. Some programs are also known for containing worms and viruses that cause a great deal of computer damage. A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably. Whether you prefer calling it Trojan malware or a Trojan virus, it’s smart to know how this infiltrator works and what you can do to keep your devices safe. How do Trojans work?Here’s a Trojan malware example to show how it works. You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cybercriminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device. When you execute the program, the malware can spread to other files and damage your computer. How? It varies. Trojans are designed to do different things. But you’ll probably wish they weren’t doing any of them on your device. Common types of Trojan malware, from A to ZHere’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer: Backdoor Trojan This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device. Distributed Denial of Service (DDoS) attack Trojan This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others. Downloader Trojan This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware. Fake AV Trojan This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake. Game-thief Trojan The losers here may be online gamers. This Trojan seeks to steal their account information. Infostealer Trojan As it sounds, this Trojan is after data on your infected computer. Mailfinder Trojan This Trojan seeks to steal the email addresses you’ve accumulated on your device. Ransom Trojan This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance. Remote Access Trojan This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you. Rootkit Trojan A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device. SMS Trojan This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs. Trojan banker This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data. Trojan IM This Trojan targets instant messaging. It steals your logins and passwords on IM platforms. That’s just a sample. There are a lot more. Examples of Trojan malware attacksTrojan malware attacks can inflict a lot of damage. At the same time, Trojans continue to evolve. Here are three examples.
How Trojans impact mobile devicesTrojans aren’t problems for only laptop and desktop computers. They can also impact your mobile devices, including cell phones and tablets. In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. Cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download. In addition, these apps can also steal information from your device, and generate revenue by sending premium SMS texts. One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users’ devices to attack the routers on their wireless networks. The result? Cybercriminals could redirect traffic on the Wi-Fi-connected devices and use it to commit various crimes. How to help protect against TrojansHere are some dos and don’ts to help protect against Trojan malware. First, the dos:
A lot of things you should do come with a corresponding thing not to do — like, do be careful with email attachments and don’t click on suspicious email attachments. Here are some more don’ts.
Trojan war winners and losersA final note on Trojans for history and mythology buffs. Trojans take their name from the hollow wooden horse that the Greeks hid inside of during the Trojan War. The Trojans, thinking the horse was a gift, opened their walled city to accept it, allowing the Greeks to come out of hiding at night to attack the sleeping Trojans. In the same way, if you’re the victim of Trojan malware, you could find yourself on the losing side. It pays to stay alert, be careful, and don’t take chances — no matter what type of devices you’re using to stay connected. Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN. Join today. Cancel anytime. *Terms Apply Start Free Trial Start Free Trial Start Free Trial Start Free Trial
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners. No one can prevent all identity theft or cybercrime. Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com. *Important Subscription, Pricing and Offer Details:
The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support. § Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes. What virus masquerades as a legitimate file or program?A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious software on your computer.
Is a type of malware that masquerades as an essential application?A Trojan horse (or just 'Trojan') is a malicious program that masquerades as something useful, tricking users into downloading it. Attackers usually use Trojans to gain access to a victim's computer.
Which type of malware is an executable program that masquerades as performing a benign activity but also does something malicious?A Trojan horse, or “Trojan”, enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware.
What type of virus comes bundled with an application?Malware is often bundled with other software and may be installed without your knowledge. For instance, AOL Instant Messenger comes with WildTangent, a documented malware program. Some peer-to-peer (P2P) applications, such as KaZaA, Gnutella, and LimeWire also bundle spyware and adware.
|