System information
24 Kaspersky Internet Security 2009
TYPE
NAME
DESCRIPTION
Trojan-
Proxies
Trojans-Proxies
They allow the intruder to access web
pages anonymously using the identity of
the user's computer, and are often used to
send spam.
Trojan-PSWs
Trojans stealing
passwords
Trojans stealing passwords (Password
Stealing Ware); they steal users'
accounts, for example, software
registration information. They find
confidential information in system files and
in the registry and send it to their
developer using methods which include e-
mail, FTP, and by accessing the intruder's
website.
Some of these Trojan programs fall into
specific types described in this table,
Including Trojan-Bankers, Trojans-IMs
and Trojans-GameThieves.
Trojan-Spies
Trojan spy
programs
These programs are used for spying on
the user: they collect information about
the user's actions on the computer: for
example, they intercept data entered by
the user at the keyboard, make snapshots
of the screen and collect lists of active
applications. After they receive this
information, they transfer it to the intruder
using methods including e-mail, FTP, or
by accessing the intruder's website.
Trojans-DoS
Trojan programs
- network attacks
For a Denial-of-Service (DoS) attack, the
Trojan will send numerous requests from
the user's computer to a remote server.
The server will exhaust its resources
processing these requests and will stop
functioning. These programs are often
used to infect multiple computers to make
a combined attack on the server.










