Trojan Horse | OWASP Foundation (2023)

Thank you for visiting OWASP.org. We recently migrated our community to a new web platform and regretably the content for this page needed to be programmatically ported from its previous wiki page. There’s still some work to be done.

Description

A Trojan Horse is a program that uses malicious code masqueraded as atrusted application. The malicious code can be injected on benignapplications, masqueraded in e-mail links, or sometimes hidden inJavaScript pages to make furtive attacks against vulnerable internetBrowsers.

(Video) Trojan Horse | Greek Mythology Series (English)

Other details can be found in Man-in-the-browserattack.

The 7 Main Types of Trojan Horse

  1. Remote Access Trojan (RAT): Designed to provide the attackerfull control of the infected machine. Trojan horse usuallymasqueraded as a utility.
  2. Data Sending Trojan: Trojan horse that uses keylogger technologyto capture sensitive data like passwords, credit card and bankinginformation, and IM messages, and sends them back to the attacker.
  3. Destructive Trojan: Trojan horse designed to destroy data storedon the victim’s computer.
  4. Proxy Trojan: Trojan horse that uses the victim’s computer as aproxy server, providing the attacker an opportunity to executeillicit acts from the infected computer, like banking fraud, andeven malicious attacks over the internet.
  5. FTP Trojan: This type of Trojan horse uses the port 21 to enablethe attackers to connect to the victim’s computer using FileTransfer Protocol.
  6. Security software disabler Trojan: This Trojan horse is designedto disable security software like firewall and antivirus, enablingthe attacker to use many invasion techniques to invade the victim’scomputer, and even to infect more than the computer.
  7. Denial-of-Service attack Trojan: Trojan horse designed to givethe attacker opportunity to realize Denial-of-Service attacks fromvictim’s computer.

Symptoms

Some common symptoms:

(Video) Oversimplified SCP Chapter 126 - SCP-4545: Trojan Horse

  • Wallpaper and other background settings auto-changing
  • Mouse pointer disappears
  • Programs auto-loading and unloading
  • Strange window warnings, messages and question boxes, and optionsbeing displayed constantly
  • e-mail client auto sending messages to all on the user’s contactslist
  • Windows auto closing
  • System auto rebooting
  • Internet account information changing
  • High internet bandwidth being used without user action
  • Computer’s high resources consumption (computer slows down)
  • Ctrl + Alt + Del stops working

Risk Factors

High: A Trojan horse can break through all security polices in anetwork, because an attacker can get access to a WorkStation with storednetwork credentials. With these credentials, an attacker can compromisethe whole network.

Examples

An iframe pointing to a javascript which downloads malware:http://isc.sans.org/diary.html?storyid=2923&dshield=4c501ba0d99f5168ce114d3a3feab567

(Video) Foreign investment in Africa: a Trojan horse? | Eka Ikpe, Stefan Dercon, Vince Cable

[[Category:FIXME link not working

A Javascript Trojan Horse example can be found on:http://www.attacklabs.com/download/sniffer.rar .

]]

(Video) The Trojan horse of ‘deep time’ (Creation Magazine LIVE! 4-12)

Related Attacks

  • TBD

Related Controls

  • TBD

References

Category:OWASP ASDR Projectneed links Category:Embedded MaliciousCodeCategory:Attack

Videos

1. The True Story of Troy: Ancient War - Full Documentary
(Sterling Documentaries)
2. Tahir Alam | The Islamophobic ‘Trojan Horse’ Scandal in Birmingham | BB #79
(5Pillars)
3. Alex Gladstein - Bitcoin Obliterates Financial Privilege & Is A Trojan Horse for Freedom 🎬 TRAILER
(London Real)
4. Alex Gladstein - Bitcoin Obliterates Financial Privilege & Is A Trojan Horse for Freedom | Part 1of2
(London Real)
5. Linux Foundation, Facebook, and the Trojan Horse
(Switched to Linux)
6. The Birmingham Trojan Horse Affair - Prof John Holmwood
(Connected Sociologies)
Top Articles
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated: 26/05/2023

Views: 5429

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.