A trojan horse is a type of malware that poses as benevolent software, while secretly installing other malware in your system.
Questions tagged [trojan]
126 questions
505
votes
9 answers
Did I just get hacked?
I am developing a consumer product, and it is supposed to be connected to the Internet, so as expected, it is connected to the Internet so that I can properly develop it.
I went away for an hour or two, and when I came back to my office I noticed…
vaid
- 3,569
15
votes
3 answers
Why can I get a virus or trojan from visiting a website?
I have seen these a lot lately. You click the link, and instant trojan. No need to download or anything.
How is this possible? Is there a way I can scan the links before visiting to make sure I won't be infected?
Rob
- 747
13
votes
3 answers
Google Chrome detected as PWS:Win32/Zbot by MSE
Microsoft Security Essentials detected Google Chrome as a Password Stealer:
PWS:Win32/Zbot
Category: Password Stealer
Description: This program is dangerous and captures user passwords.
Recommended action: Remove this software immediately.
Security…
PabloC
- 233
12
votes
4 answers
Can you really get a trojan in an image file and if so how will it be executed?
I've just digitized a couple of LPs and needed some cover art. My scanner isn't big enough to scan the album so I searched for and downloaded the images off the net.
When I did so Avast reported that one of them contained the "Win32:Hupigon-ONX"…
ChrisF
- 41,540
10
votes
5 answers
Download Virus/Malware Purposefully
Where can I download a virus, work, trojan, etc. for analysis? Yes, I'm actually hunting for malware, rather than keeping it at bay and hiding behind antivirus software and firewalls. I plan to analyze it in a lab for a project, but don't know where…
Matt Hanson
- 942
9
votes
2 answers
How can I determine if a file or executable has a keylogger included with it?
I had a program created for me recently and didn't really think about it being executable posing a threat since I pretty much trust the source, but not completely.
I then thought about the fact that a keylogger, or any kind of spyware or malicious…
user36250
8
votes
0 answers
How I analyzed svchost high CPU utilization problem
My machine was attacked by a trojan that manifested itself as a service in the netsvcs svchost process. This process can be identified using Process Explorer as 'svchost -k netsvcs'.
The symptoms I had indicating my machine had been infected were: …
user64842
- 181
- 1
- 3
8
votes
4 answers
Detecting damage done by virus
This morning after I went to college, a virus infected my PC without any user interaction at my end. When I came home my computer was completely frozen and infected with lots of trojans. I have not typed anything important since returning so keys…
user38471
- 81
- 2
7
votes
8 answers
Is software from NCH Software safe?
I just downloaded Fling from them (an automatic ftp uploader) having been looking for a good app to do this for a long time. It just seems to good to be true to finally stumble across what looks to be a good piece of software.
Here's their site:…
Matt
- 432
6
votes
4 answers
locale.exe and tzset.exe trojans in Cygwin
I was updating wget this morning and Symantec notified me of trojans detected in locale.exe and tzset.exe
Does this mean my cygwin installation is infected?
Sinsanator
- 163
- 4
5
votes
6 answers
Software with Malicious Intent binded to executable?
I had some software created for me by a coder overseas. I'm a little suspicious since the software is executable. I started thinking about the possibility that they could have binded a key logger to the application they made for me or any kind of…
Brandon
4
votes
3 answers
How do I properly check if a program is a virus/trojan in VMware?
How I should check if a program is a virus in VMware? Some programs I do need admin ability to install and it makes sense. But how do I know if it's doing more than I want? Some thoughts are:
How many processes open when I launch the…
user3109
4
votes
1 answer
Accessing rights of worms,viruses,etc
If I create a folder named nul (or con, prn,etc) which are DOS reserved names, I will not be able to edit (or modify or delete) files inside it directly. So my doubt is that, if the PC is infected with a worm (or virus or trojan), will it be able to…
Jack
- 41
4
votes
3 answers
Leftovers of a trojan cause popups saying "crss.exe" cannot be found
I am helping out a coworker with Winodws XP 32-bit, and took off a Trojan using Malwarebytes, Spy-bot Search and Destroy, and Trojan remover with total annihilation of the Trojan. I also had to find the folder and delete the folder that the Trojan…
David
- 7,393
4
votes
4 answers
What triggers a Trojan file to be executed after it gets downloaded to your machine?
I posted a question earlier about some Trojans (they seem to be Java-related) that were found and deleted from my machine by a recent scan.
But what I don't know is whether these Trojans ever actually executed.
When you download a regular…
Lynx
- 413