There are seven main types of Trojan horse payloads that are classified based on how they breach systems and the damage they cause. These payloads include remote access, data destructive email sending, downloader, proxy Trojan, FTP Trojan, security software disabler, and URL Trojan payloads, each designed to harm systems in different ways such as providing complete attacker control, destroying files, downloading additional malware, disguising infected computers, and disabling security programs.
1 of 8
Downloaded 14 times
More Related Content
Impact of ict on society virus
4. Types of Trojan horse payloads
Trojan horse payloads are almost always designed to do various harmful
things, but could be harmless. They are broken down in classification
based on how they breach systems and the damage they cause.
? The seven main types of Trojan horse payloads are:
1. Remote Access (designed to provied the attacker with complete
control of the victim¡®s system)
2. Data Destructive Email Sending (designed to destroy and delete files)
3. Downloader (download manager for Microsoft Windows)
4. Proxy Trojan (disguising others as the infected computer)
5. FTP Trojan (adding or copying data from the infected computer)
6. Security software disabler (designed stop or kill security programs such
as antivirus program or firewall without the user knowing)
7. URL Trojan (directing the infected computer to only connect to the
internet via an expensive dial-up connection)