How Your Computer Can Be Infected – Volume 3: Trojan horses, rootkits and backdoors

Related image

The last part of our ministry about possible infections of computers and other similar devices is devoted to three types of malware, namely malicious software that does not belong to viruses. This time, Avast’s computer security experts will help us explain this.

While the viruses and worms primarily capture their ability to copy and propagate, the power of the rootkits and backdoors lies in their secrecy. They are fascinated by hiding in the infected system without the users knowing it. Each of these malicious software uses a different strategy, but you can get the same way to your computer – and here’s why we advise: Install a reliable antivirus ! Although this is not a virus itself, it will protect you from them.

Trojan Horse
Surely you know the famous Greek goddess from the times of the Trojan War, in which the Dana donated to his enemy a beautiful giant horse they hid in, and when they got through the walls, they climbed and started to kill the Trojans. The same Danish gift is a type of software called a Trojan horse – it looks like something nice and useful, it invites the user to download it, so the trustee puts it in the ramparts of the device, but then awaits unpleasant surprises such as the theft of sensitive data, , installing unwanted software, showing ads …

Often, this is spyware , a program designed to collect information about the user. They control your web browser, watch what sites you visit, force you unwanted ads, and sometimes even have a license agreement, which makes it legal if you agree to install it. For example, it could be a marketing tool for operators of sites that people do not like to visit – they are not willing to solve the damage caused, and demand compensation.

You will most likely be downloaded from the Internet. Therefore, we stress: download only from certified sources and read reviews and licensing arrangements for each program!

Rootkit
Another secret marauder modifies the guest operating system so that it is invisible to a normal user and therefore not easily erased. They do the same damage as if you were to leave a bad guest to your facility. In particular, it tries to conceal the routines of a malicious program and prevent its removal, for example, it can block access to it or run a refresh process that can restore the deleted rootkit again.

Backdoor
Backdoor means the back door in English. Backdoors create a back door to your device, allowing for unauthorized use. You will often download them together with another malicious program that installs them to keep the backdoor open and your computer is easier to find for attackers in the future.