The development history of Trojans and viruses

Source: Internet
Author: User

The name of the Trojan horse in the computer world is remembered by the Trojan War in the Epic of HOMA. The story tells us that the Greek people still cannot beat the city after a decade of siege, so agemenon was inspired by Athena: hiding the soldiers in a huge Trojan and then leaving the army. When the Trojan Horse is dragged into the city as a trophy, the tall Trojan Horse is stuck between the gate, dilemma. At night, the soldiers inside the trojan crawled out and joined forces outside the city to attack the city of Troy. Trojan in the computer world refers to a piece of special malicious code hidden in normal programs, it is a backdoor program with special functions such as file destruction and deletion, sending password, record keyboard, and Dos attack.

First-generation Trojan: disguised Virus

The virus spoofs users into a legitimate program. The first computer Trojan in the world was the PC-Write trojan in 1986. It is disguised as the 2.72 version of the shared software PC-Write (in fact, Quicksoft, which has never released version 2.72). Once the user believes that the trojan really runs, in this case, the hard disk is formatted. When I was just in college, I heard that a senior ox in our school made a logon interface Trojan program using BASIC in the WAX data center. When you set your user ID, after you enter a pseudo-Logon interface identical to the normal logon interface, the trojan program saves your ID and password while prompting you to re-enter the wrong password, when you log on for the second time, you have become a victim of Trojans. At this time, the first generation of Trojan horse does not have the infectious characteristics.

Second generation Trojan: AIDS Trojan

After PC-Write, an AIDS trojan was launched in 1989. Since few people were using e-mails at that time, the authors of AIDS used real-life emails to spread: they sent emails containing a trojan floppy disk to others. The reason for calling this name is that the floppy disk contains information about medicines, prices, and preventive actions for AIDS and HIV diseases. Although the trojan program in the floppy disk does not damage data after running, it locks the hard disk and then prompts the infected user to spend money on disaster recovery. It can be said that the second-generation trojan has the transmission characteristics (though through the traditional delivery mode ).

Third-generation Trojan: Network Communication Trojan

With the popularity of the Internet, this generation of Trojan horse features both disguise and spread, and combined with TCP/IP network technology spread everywhere. At the same time, he has new features:

1. added the "backdoor" function.

A backdoor is a program that secretly opens an access point for the computer system. Once installed, these programs allow attackers to bypass the security program into the system. This function is used to collect important information in the system, such as financial reports, passwords, and credit card numbers. In addition, attackers can exploit the backdoor Control System to attack other computers. The backdoor is hidden behind the system, so it is difficult to detect it. Unlike viruses and worms, they draw attention by consuming memory.

2. added the key logging function.

As you can see from the name, this function is mainly used to record all the user's key content and then form a log file for the key record to be sent to malicious users. Malicious users can find their usernames, passwords, credit card numbers, and other user information. This generation of Trojans is famous for BO2000 (BackOrifice) and Ice Horse in China. They share the following features: network-based client/server applications. It can collect information, execute system commands, reset machines, and redirect. After a trojan program is attacked, the computer is completely controlled by hackers. hackers become superusers, and all the operations on the user's computers are not only confidential, moreover, hackers can remotely control the zombie host to launch attacks on other hosts. At this time, the captured zombie host becomes a shield and springboard for further attacks by hackers.

Although trojan programs are becoming more and more concealed, as long as they strengthen their personal security awareness, they can greatly reduce the chance of "moderate recruitment. The author has the following suggestions: Install personal anti-virus software and personal firewall software; install system patches in a timely manner; ignore emails and plug-ins from unknown origins; often go to security websites to turn around, in order to know the details of some new Trojans in a timely manner, so that you can know yourself and know what you want.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.