- Solutions for:
- Home Users
- Products
- KasperskyTotal Security
- KasperskyInternet Security
- KasperskyAnti-Virus
- KasperskyInternet Security for Mac
- Kaspersky Internet Security for Android
- Kaspersky Free
Free Tools
- Kaspersky Battery Life
- Kaspersky Secure Connection
- Kaspersky Safe Kids
- Kaspersky Password Manager
- Kaspersky Security Scan
- Kaspersky Software Updater
- Kaspersky Virus Scanner for Mac
- View more
- Renew
- Downloads
- Support
- Resource Center
- Encyclopedia
- Glossary
The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.(This section is currently under construction)
- Knowledge Base
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.The Knowledge Base now has three main sections:– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
- Glossary
- My Kaspersky
- Products
- Small Business(1-50 employees)
- Medium Business(51-999 employees)
- Products
- KasperskyEndpoint Security Cloud
- KasperskyEndpoint Security for Business Select
- KasperskyEndpoint Security for Business Advanced
- KasperskySecurity for Business Total
TARGETED SECURITY SOLUTIONS
- Mail Server
- File Server
- Mobile
- Internet Gateway
- Virtualization
- Collaboration
- Vulnerability and Patch Management
- Storage
- View More
- Services
- Downloads
- Support
- Resource Center
- CompanyAccount
- Products
- Enterprise(1000+ employees)
- Solutions
- Products
- Services
- Resource Center
- Contact Us
- CompanyAccount
- Partners
- About Us
- Support
- Contact Us
- Kaspersky IT Encyclopedia
- Glossary
- p
- PSW Trojans (Password-stealing Trojans)
These Trojans are designed to steal passwords from the victim’s computer (although some steal other types of information also:
IP address, registration details, e-mail client details, and so on).
This information is then sent to an e-mail address coded into the body of the Trojan.
The first PSW Trojans emerged in the 1990s and were AOL password stealing Trojans.
Related Posts
Malvertising through search engines
Crimeware and financial cyberthreats in 2023
NullMixer: oodles of Trojans in a single dropper
Products to Protect You
Our innovative products help to give you the Power to Protect what matters most to you. Discover more about our award-winning security.
FREE Tools
Our FREE security tools and more can help you check all is as it should be… on your PC, Mac or mobile device.
About Us
Discover more about who we are… how we work… and why we’re so committed to making the online & mobile world safer for everyone.
Get Your Free Trial
Try Before You Buy. In just a few clicks, you can get a FREE trial of one of our products – so you can put our technologies through their paces.
Contact Our Team
Helping you stay safe is what we’re about – if you need to contact us, get answers to some FAQs or access our technical support team.
Connect With Us
Blog List
- Western Europe
- Deutschland & Schweiz
- España
- France & Suisse
- Italia & Svizzera
- Eastern Europe
- Россия (Russia)
- For all other countries
- Global
FAQs
Can a Trojan virus steal passwords? ›
There are a variety of types of Trojans, many of which can launch sophisticated and clever attacks. Here are some types to be aware of: Password-stealing Trojans—These look for saved passwords on your computer and email them to the hackers. Some can even steal passwords cached in your browser history.
How does a Trojan steal passwords? ›These Trojans are designed to steal passwords from the victim's computer (although some steal other types of information also: IP address, registration details, e-mail client details, and so on). This information is then sent to an e-mail address coded into the body of the Trojan.
Can a Trojan virus be removed? ›Trojan viruses can be removed in various ways. If you know which software contains the malware, you can simply uninstall it. However, the most effective way to remove all traces of a Trojan virus is to install antivirus software capable of detecting and removing Trojans.
What virus steals passwords? ›Trojan. PasswordStealer may attempt to steal stored credentials, usernames and passwords and other personal and confidential information. This information may be transmitted to a destination specified by the author. Trojan.
Can Windows Defender detect Trojans? ›How to protect against trojans. Use the following free Microsoft software to detect and remove it: Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for previous versions of Windows. Microsoft Safety Scanner.
Can Trojan hack my accounts? ›Emails with Malicious Attachments
Another popular attack vector is email spam with malicious attachments that infect users' computers with malware. Malicious attachments usually carry trojans that are capable of stealing passwords, banking information, and other sensitive information.
Malware on your computer
With the help of a kind of spyware known as a keylogger program, you are tracked while typing on the infected device. By recording your keystrokes, the hacker can steal your passwords and other sensitive data and use it to access your accounts, including email, social media and online banking.
In addition to spotting known trojans, the McAfee antivirus program can identify new trojans by detecting suspicious activity inside any and all of your applications.
Can a Trojan virus record you? ›Cybercriminals can use so-called Trojan horse malware. You click on an attachment or download a piece of music or video infected with malware, and hey presto! – A cybercriminal can remotely control your PC's functions – including your camera and microphone and may even be able to record images and audio remotely.
What can Trojan steal? ›Backdoor Trojan: A backdoor Trojan enables an attacker to gain remote access to a computer and take control of it using a backdoor. This enables the malicious actor to do whatever they want on the device, such as deleting files, rebooting the computer, stealing data, or uploading malware.
Can Trojan go undetected? ›
Malware can take many forms, including viruses, worms, trojan horses, ransomware, and spyware. Can malware be undetected? Yes, malware can hide itself and antivirus and other protection programs may not catch it.
Does factory reset remove Trojans? ›Performing a factory reset is the best way to get rid of viruses, spyware, and other malware. A factory reset will delete everything that wasn't originally installed on the device. This includes any viruses that infected your operating system and files.
How do I open hidden files on Trojan? ›- Open Command Prompt (CMD) as an Administrator.
- Navigate to the drive whose files are hidden and you want to recover.
- Then Type attrib -s -h -r /s /d *. * and hit Enter.
- That is it. Now you will get all the hidden files and folder as general files and you can use it.
Keylogger programs enable hackers to spy on you, as the malware captures everything you type. Once inside, the malware can explore your computer and record keystrokes to steal passwords. When they get enough information, hackers can access your accounts, including your email, social media, and online banking.
How do hackers keep getting my password? ›The easiest and most common way that hackers get passwords is from data breaches, in which huge amounts of user data has already been leaked or stolen from companies. This data, which often includes usernames and passwords, is compiled into databases and may be sold on the dark web or downloaded freely on forums.
How bad is a Trojan virus? ›Trojan viruses are some of the most common malicious threats that impersonate legitimate software. That's why it can be difficult to notice them. Trojan viruses can steal your personal information, give external hackers control over your computer or mobile devices, add them to a botnet, or disrupt their performance.
How do I know if I have a Trojan virus? ›In the Windows search bar, type virus , click Virus & threat protection in the search results, and then click Scan Options. Select Microsoft Defender Offline Scan and click Scan Now.
Does resetting PC remove virus? ›Running a factory reset, also referred to as a Windows Reset or reformat and reinstall, will destroy all data stored on the computer's hard drive and all but the most complex viruses with it. Viruses can't damage the computer itself and factory resets clear out where viruses hide.
Can a Trojan steal your information without an Internet connection? ›Can a trojan virus work without the internet? Once activated, a trojan can block, delete, and copy data without access to the internet. That said, cybercriminals can only steal or send your data from your device when the internet is available. With your phone, trojan malware can work without the internet.
Can hackers remotely access your computer? ›Malicious hackers can easily hack your Wi-Fi network, take over remote access of your computer, or hack your passwords with phishing attacks. To protect your personal information, sensitive documents, and financial accounts, you need to secure your personal devices.
Can spyware steal passwords? ›
Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.
Which malware secretly gathers your personal information? ›Spyware, also known as "adware," is software that sends information from your computer to a third party without your consent. Besides secretly monitoring a user's behavior, spyware collects personal information, which could lead to identity theft.
Which malware collects user activity without their knowledge? ›Spyware collects information about users' activities without their knowledge or consent.
Does changing password stop hackers? ›PREVENTS CONSTANT ACCESS
A hacker may attempt to access your account more than once over a period of time. Changing your password often reduces the risk that they will have frequent access.
Trojan Attacks
A trojan attack tricks you into downloading malware hiding a virus that then tramples all over your phone, tablet, or computer. A router virus can ride inside a trojan, waiting to sniff out vulnerable public or home Wi-Fi networks to infect.
VPNs encrypt network traffic, but they can't stop you from downloading and executing Trojan software on devices.
How do you tell if a Trojan is a false positive? ›- Run a quick Google search. ...
- Check your antivirus for updates. ...
- Cross-check using VirusTotal. ...
- Get rid of PUPs. ...
- Use the antivirus's knowledge base/customer support. ...
- Review the flagged files on your device.
If a hacker installs spyware on your phone then there is a good chance they will be able to access your camera and turn it on/off as they please. They may also be able to access any photos or videos you have previously taken.
Can someone see you through your phone camera? ›YES, your phone camera can be easily hacked. Hackers can use your smartphone's camera to hack your device and spy on you and get access to your phone without your knowledge! How can spyware control your phone's camera?
Can hackers see your screen? ›Can a hacker access my computer camera, microphone, and screen? Yes. Cybercriminals use malware like spyware to remotely access and control your camera, microphone, and screen. In fact, malicious actors often use camera and microphone recordings to blackmail people.
What is the most harmful Trojan? ›
Gameover ZeuS
It's the same Trojan horse used to create and replicate the CryptoLocker ransomware. ZeuS can bypass centralized servers, creating independent ones to send sensitive information and prevent the victim from even tracing their stolen data.
In some cases after an update, a scan may falsely detect a previously undetected legitimate file as malicious and it is recommended to get a second opinion before taking action.
Can iphones get Trojan viruses? ›Although viruses are uncommon on the iPhone, it's possible to get infected with an iPhone Trojan or spyware that can expose your phone's activity to a third party. Keeping your iOS up to date can greatly reduce the chances of this happening.
How common is Trojan attacks? ›17. Trojans account for 64.31% of all malware attacks on Windows systems, followed by viruses at 15.52%. Trojans known as Trojan Horse are malicious programs that disguise themselves as legitimate software to trick users into installing them.
Does Trojan always mean virus? ›A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that's a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans.
How do I manually remove a Trojan virus? ›The best way to clean up a Trojan infection is to use Malwarebytes' free trojan scanner, and then consider Malwarebytes Premium for proactive protection against future Trojan infections. Malwarebytes Premium will initiate a scan for Trojans and then remove Trojans so they can't cause further damage.
What virus can survive a factory reset? ›Viruses may remain after a factory reset
Some instances where viruses don't get removed by a factory reset are: 1. You may have rootkit malware on your iOS or Android device. This malware will give administrator access to hackers without your knowledge.
The recovery partition is part of the hard drive where your device's factory settings are stored. In rare cases, this can become infected with malware. Hence, doing a factory reset will not clear the virus.
What is the code for hidden files? ›To show hidden files, you need to include the /a:h modifier in that command. So, dir /a:h C:your-folder will do the trick. CMD also has specific commands for showing directories and folders. /a:d shows all hidden directories, and /a shows hidden folders.
How do I find hidden log files? ›Open File Explorer from the taskbar. Select View > Options > Change folder and search options. Select the View tab and, in Advanced settings, select Show hidden files, folders, and drives and OK.
How does a Trojan file look like? ›
In the IT world a trojan horse is a file wich looks like for instance an MP3 file but is actually malicious. When you open the file you install the malware. So actually you do all the work and install the file by yourself by running an .exe file wich looks like an MP3 file.
What is the number 1 most used password? ›- 123456.
- 123456789.
- qwerty.
- password.
- 12345.
- qwerty123.
- 1q2w3e.
- 12345678.
Use long, complex passwords that use spaces, capital letters, lower case letters, numbers and special characters. To make them easier to remember, consider using a sentence that has meaning to you.
What techniques do hackers use to steal information? ›- Phishing. ...
- Bait and Switch Attack.
- Key Logger.
- Denial of Service (DoS\DDoS) Attacks.
- ClickJacking Attacks.
- Fake W.A.P.
- Cookie Theft. ...
- Viruses and Trojans.
The most common types of cyberattacks are malware, social engineering, hacking, credential compromise, web attacks, and DDoS attacks.
Are there uncrackable passwords? ›A password made up of a random combination of upper-and-lower case letters, numbers, and special characters, such as Pz27Qx9WQlm!, is nearly uncrackable.
Can Trojans steal passwords? ›There are a variety of types of Trojans, many of which can launch sophisticated and clever attacks. Here are some types to be aware of: Password-stealing Trojans—These look for saved passwords on your computer and email them to the hackers. Some can even steal passwords cached in your browser history.
How do Trojans get on your computer? ›Generally speaking, a Trojan comes attached to what looks like a legitimate program, however, it is actually a fake version of the app, loaded up with malware. These cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download.
What will happen if Trojan is detected? ›Trojans can come in many different varieties, but generally they do the following tasks: Download and install other malware, such as viruses or worms. Use the infected device for select fraud. Record keystrokes and websites visited.
Can Microsoft Defender remove Trojan? ›Windows Defender cannot remove all Trojans from your device. There may be additional steps you have to take to remove them. Make sure Windows Defender performs a virus scan. Type “Windows Security” in your search box and choose the “Virus & Threat Protection” option.
Can a Trojan virus infect a phone? ›
Yes. Just like computers, smartphones can get infected with malware. It can enter the system through infected apps, email attachments, and suspicious links.
Can a virus completely destroy a PC? ›At the same time, the virus is wreaking havoc: it can damage programs, delete files, and make devastating changes to your hard drive, all of which can result in reduced performance. Some viruses will even crash your entire system.
Does factory reset get rid of hackers? ›Yes, you should be able to remove a hacker by doing a factory reset on your phone. Keep in mind that this solution will remove all of your data, including contacts, third-party apps, photos, and other files. You will need to set up your phone entirely from scratch.
Can a virus access your passwords? ›Keylogger programs enable hackers to spy on you, as the malware captures everything you type. Once inside, the malware can explore your computer and record keystrokes to steal passwords. When they get enough information, hackers can access your accounts, including your email, social media, and online banking.
Can a Trojan steal your data? ›If you've found yourself in this situation, or even thinking you are, there's a real possibility you could have a Trojan virus on your computer. Trojan viruses can not only steal your most personal information, they also put you at risk for identity theft and other serious cybercrimes.
Can viruses get your password? ›Another popular way to get hold of your passwords is via malware. Phishing emails are a prime vector for this kind of attack, although you might fall victim by clicking on a malicious advert online (malvertising), or even by visiting a compromised website (drive-by-download).
Can hackers get your saved passwords? ›Anyone who lays hands on your device at the office, the cafe, or the subway (if you accidentally leave your briefcase behind) can access every account you have saved in Chrome passwords. This leaves you wide open to being hacked. Most of us sync our Chrome accounts across devices.
Can hackers see my saved passwords? ›Passwords saved on your web browser are prone to hacking. Here's what you can do to keep your data safe. Passwords stored on web browsers can be easily stolen by a malware called Redline Stealer. Passwords stored on web browsers can be easily stolen by a malware called Redline Stealer.
Can a Trojan virus spy on you? ›Trojan-Spy programs can spy on how you're using your computer – for example, by tracking the data you enter via your keyboard, taking screenshots or getting a list of running applications.
How did someone get my password? ›The easiest and most common way that hackers get passwords is from data breaches, in which huge amounts of user data has already been leaked or stolen from companies. This data, which often includes usernames and passwords, is compiled into databases and may be sold on the dark web or downloaded freely on forums.
Can a virus get your IP address? ›
Just as they do to find personal info online in order to target users for malware infection, cybercriminals can be awfully crafty to find your IP address. Here are some of the ways attackers drill down to see that magical number. Attackers can use social engineering to fool you into revealing your IP address.
How much damage can a Trojan do? ›A Trojan is a type of virus that can have highly destructive effects: from deleting files to destroying all the contents of the hard disk. Trojans can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.