System information
Threats to computer security 23
TYPE
NAME
DESCRIPTION
Trojan-
Droppers
Trojan program-
droppers
These programs save programs
containing other Trojan programs on the
computer's disk and then install them.
Intruders can use Trojans-Droppers:
install a malware programs without the
user's knowledge: trojans-droppers do
not display any messages or do display
false messages, for example, notifying
about an error in the archive or about
using the wrong version of the
operating system;
protect another known malware
program from being detected: not any
anti-virus program can detect a
malware program located inside a
trojan-dropper.
Trojans-
Notifiers
Trojans-notifiers
They notify the intruder that the infected
computer is connected; and then - transfer
information about such computer to the
intruder, including: IP address, number of
an open port or the e-mail address. They
communicate to the intruder by e-mail, via
FTP, by accessing the intruder's web
page or using other methods.
Trojans-notifiers are often used in sets
comprised of various Trojan programs.
They notify the intruder that other Trojan
programs are successfully installed on the
user's computer.
Trojans-
Proxies
Trojans-Proxies
They allow the intruder to access web
pages anonymously using the user's
computer and are often used to send
spam.