In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Questions tagged [trojan]
141 questions
24
votes
4 answers
Verifying android application integrity from server side
I have android applications (Mobile banking) that connect to my server and do online transactions (via Internet/USSD/SMS), I want to make sure those clients are not tampered with and are the original ones distributed by me.
Keep in mind that not all…
Silverfox
- 3,369
- 2
- 19
- 39
22
votes
2 answers
Can a Trojan hide itself, so its activity doesn't appear in task manager process?
Can malicious software hide itself, so its activity doesn't appear in the list of processes from Task Manager? Can it hide itself so when someone is controlling your computer, even if you open Task manager, you won't see any suspicious activity?
If…
Steve
- 259
- 3
- 7
21
votes
4 answers
Is VLC on Linux vulnerable to an attack from .wmv files designed to install viruses?
I was stupid and did not check a video file I downloaded from an untrustworthy source. It was .wmv file with no readable properties of the video. I know that .wmv videos can download viruses. What I don't know is if they can do this to VLC on Linux…
user
- 817
- 10
- 16
16
votes
3 answers
remote desktop connection to a potentially compromised machine
I am using rdesktop client on Linux to connect to windows machines. If some of these machines were compromised by some evil malware/virus/worm/trojan, is there any way for the malware to "jump" to my computer over the rdesktop connection?
I have…
Martin Vegter
- 1,826
- 4
- 27
- 39
16
votes
2 answers
Is there a inherent security threat to having border security receive your passwords?
There have been a number of cases when border security officials have requested passwords to mobile data devices as indicated in the questions US and Canada border crossing and computer privacy: What do I need to know? and Do I need to provide PIN…
KalleMP
- 263
- 1
- 9
15
votes
5 answers
Can a Trojan horse hide its activity from TCPView?
Can a Trojan horse hide its activity from TCPView?
I've done a little research before asking, but I still can't find the answer for this.
I know that a Trojan horse can hide from the Windows Task Manager through various methods. Also, less…
JohnSt
- 185
- 1
- 7
14
votes
3 answers
Drupal server compromised - I want to investigate the attack technique / compromise
I've got a drupal site running on an up to date CentOS 7 LAMP AWS EC2 instance (freshly installed a couple of months ago) and I've just found out that somehow, probably through a poorly coded 3rd party module downloaded from drupal site and…
NotGaeL
- 242
- 1
- 9
12
votes
2 answers
Advertisement on Skype tried to download a file to my computer using Javascript
I usually have Skype running in the background. If you have ever used Skype before, you probably know it has advertisements. One of these advertisements made two windows pop up on my screen, asking to download a file. Windows caught it though (for…
Greg M
- 245
- 1
- 8
10
votes
7 answers
Difference between virus and trojan?
To my current understanding:
A virus is a program that does not self replicate and relies on the host file being spread. It has malicious intent.
A trojan is a program that is run by deceiving the user into appearing to be something legitimate, but…
Lenard
- 109
- 1
- 3
9
votes
3 answers
How to interpret virustotal, virusscan scan?
I was looking at a popular file sharing app called Zapya and really liked it's functionality.
I scanned the Windows executable ZapyaPC28Lite.exe, on two online virus…
get_going
- 123
- 1
- 7
8
votes
3 answers
Trojan "Win32/Tnega!MSR" found by Windows Defender - aliases used by other antiviruses?
Recently I had a Windows 10 (64 bit) PC where Windows Defender would report that it found and (apparently) removed a "threat" it calls Win32/Tnega!MSR. Unfortunately, the removal was unsuccessful, and after restarting the machine, the same message…
rob74
- 183
- 1
- 1
- 5
8
votes
2 answers
macOS and .ssh/id_rsa security
My super crucial private key is stored at ~/.ssh/id_rsa
with a chmod of "-rw-------"
I run a lot of applications on my Mac.
For example:
Bash scripts
.app binaries (For example, Sketch.app)
Ruby gems and Python packages
It seems to me that…
american-ninja-warrior
- 179
- 6
8
votes
2 answers
Can a malware infect just by right clicking?
Someone I know got infected. He sent me the file to analyze. I downloaded the zip and it contained a scr file. I unzipped it and right-clicked to open it in Notepad++. It immediately got quarantined by my AV (Security essentials) and I could not…
Jus12
- 1,315
- 2
- 11
- 16
7
votes
4 answers
Where can I find an engineer who can examine an exe and verify its legitimacy?
We have an exe file that our members have been using. It was submitted to VirusTotal and it returned one red flag:
How can we have the app evaluated by a 3rd party software engineer? And how likely is it the app can be evaluated accurately?
Neal
- 87
- 1
- 4
7
votes
3 answers
What is coin hive virus?
My Kaspersky Internet Security said it detects a trojan at (do not go to the link below, my KIS said it's trojan):
https:// coinhive.com/lib/coinhive.min.js
The Trojan name is Trojan.JS.Miner.d.
When I see this trojan, I have to monkey around with…
123iamking
- 235
- 2
- 3
- 9