Trojan Virus Presented by Andy Lindberg & Denver Bohling
Trojan War
What is a Trojan Virus? Software that disguises itself as something helpful and safe Not actually a virus Doesn’t replicate itself Usually performs background processes that are usually harmful (depending on the functional purpose of the Trojan)
Types of Trojans Remote Access Trojan Gives attacker complete control Access to the file system Password Sending Trojan Searches cached passwords watches for new ones to be entered to send that info to a target host
Types of Trojans Keylogger Trojan Records the users key strokes Destructive Trojan Deletes files from the system Denial of Service (DoS) Trojan Floods the internet traffic on the users computer
Types of Trojans File Transfer Protocol (FTP) Trojan Opens up a port to allow an attacker to make an FTP connection with the infected computer Hybrid Trojans
The Future of Trojans “Computer viruses are now airborne, infecting mobile phones in every part of the globe. Security companies, cellular operators and phone makers are moving to quash these threats before they spiral out of control.” – Mikko Hyyponen
Trojans & Mobile Phones First rogue program created in 2003 Did nothing but drain the battery of the phone Tried to spread itself through Bluetooth connections Smartphone applications & third party app stores As of 2006, 70% of Smartphones ran on a Symbian based operating system Many viruses are designed for this kind of system
Trojans & Mobile Phones “ Soundminer ” Developed by researchers from City University of Hong Kong Required a small amount of permissions (no internet, etc.) Recorded credit card information By keypad typing By voice Encodes the collected data In form of vibration setting
Trojans & Mobile Phones “ Deliverer ” Decodes the message from “Soundminer” Sends the decoded message to a remote server Vibration settings channel 87 bits 54 bits needed for credit card info
Prevention Mobile phones Mobile phone antivirus software is offered When downloading apps: Check permissions the app requires for use PC Update Antivirus software Check for unusual behavior Be careful of what you download
Sources Hypponen, Mikko. “Malware Goes Mobile”. Scientific American, INC. November April 16, Kiran.Kola, Mahathi. “Botnets:Overview and Case Study”. Mercy College April 16, Kirk, Jeremy. “Soundminer Trojan horse steals Android phone data”. IDG News Service. January 20, April 17, _phone_data. _phone_data “Malware History – Trojan Horses”. Malware City.com. August 11, April 18, “New Trojan Horse Attacks Android to Steal User’s Information”. Mobile Phone Lover. February 18, April 17, android-to-steal-users-information.html “Trojan Virus”. TopBits.com. August 5, April 16,