The "No Network is 100% Secure" series
- Trojan Horse (computer) Malware -
A White Paper


All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants

Contact Us

What is a Trojan Horse?: A Trojan horse, also known as a Trojan, describes a class of computer malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. These could include allowing unauthorized access to the host machine, logging the user's keystrokes (spyware) and even permitting complete control over the computer.

Trojan Horses (not technically a virus) can be easily and unwittingly downloaded. This is usually done by tricking the user into downloading and activating malevolent software under the guise of being an ActiveX plug-in, driver, game or some other "desired" piece of software or function. The Trojan, one activated, opens a back door that allows a hacker to control the computer of the user. In recent years, sophisticated designs have made it increasingly easier to trick users into installing Trojans onto their computers. Additionally, the Trojan removal process has become correspondingly more difficult. The term is derived from the classical story of the Trojan Horse.

A program named "waterfalls.scr" serves as a simple example of a Trojan horse. The author claims it is a free waterfall screen saver. When running, it instead unloads hidden programs, scripts, or any number of commands without the user's knowledge or consent. Malicious Trojan horse programs conceal and install a malicious payload on an affected computer.

The Zlob Trojan is another, much more insidious and destructive Trojan. When visiting a web site, the user is asked if they want to install an ActiveX control so that the user can view the site contact (often videos). At this point, the Trojan has already been downloaded to the user's computer. Clicking anywhere on the request pad (not just the "OK" button) will install and activate the Trojan.

Once installed, it displays popup ads with appearance similar to real Microsoft Windows warning popups, informing the user that their computer is infected with spyware. Clicking these popups trigger the download of a fake anti-spyware program (such as Virus Heat) in which the Trojan horse is hidden.

Some variants of the Zlob family, like the so-called DNSChanger, adds rogue DNS name servers to the Registry of Windows-based computers, network settings of Macintosh computers and attempts to hack into any detected router to change the DNS settings and therefore could potentially re-route traffic from legitimate web sites to other suspicious web sites.

The Trojan has also been linked to downloading atnvrsinstall.exe which uses the Windows Security shield icon to look as if it is an Anti Virus installation file from Microsoft. Having this file initiated can wreak havoc on computers and networks. One symptom is random computer shutdowns or reboots with random comments. This is caused by the programs using Scheduled Tasks to run a file called "zlberfker.exe".

PHSDL - Project Honeypot Spam Domains List tracks and catalogues Zlob spam Domains. Some of the domains on the list are redirects to porn sites and various video watching sites that show a number of inline videos. Clicking on the video to play activates a request to download an ActiveX codec which is malware. It prevents the user from closing the browser in the usual manner. Other variants of Zlob Trojan installation are in the form of computer scan that comes as a Java cab.

There is evidence that the Zlob Trojan might be a tool of the Russian Business Network or at least of Russian origin.

SpySheriff is malware that disguises itself as an anti-spyware program, in order to trick the owner of the infected computer to buy the program, by repeatedly informing them of false threats to their system. SpySheriff often goes unnoticed by actual anti-spyware programs, and is difficult to remove from an infected computer.

SpySheriff cannot be simply deleted, as it reinstalls itself through hidden components on the computer. Trying to remove it with the Add/Remove programs feature has similar results, or may result in a system crash. A blue screen of death may occur. The program will stop the computer from connecting to the internet or a limited internet connection, and will display an error message reading "The system has been stopped to protect you from Spyware."

The desktop background can also be replaced with a blue screen of death, or a notice reading: "SPYWARE INFECTION! Your system is infected with spyware. Windows recommends that you use a spyware removal tool to prevent loss of data. Using this PC before having it cleaned of spyware threats is highly discouraged." SpySheriff has been known to create another user account, at the administrator level, to block access to programs and utilities for other users. If logged in as an administrator, it is sometimes possible to delete the SpySheriff account. It also acts to stop any attempt to do a System restore by preventing the calendar and restore points from loading. This prevents the user from being able to revert their computer to an earlier usable state. A System restore is however often possible after booting in Safe mode.

It blocks several websites, including the ones that have downloadable anti-spyware software, locks the user's Internet Explorer options, and It has also been implemented in pirated versions of Norton Antivirus. It will likely create the need for the use of a recovery disk in order to restore original factory specs.

Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a Trojan horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.

A Vundo infection is typically caused either by opening an e-mail attachment carrying the Trojan, or through a variety of browser exploits, including vulnerabilities in popular browser plug-ins, such as Java. Many of the popups advertise fraudulent programs such as Sysprotect, Storage Protector, AntiSpywareMaster, WinFixer, AntiVirus 2009, and AntiVirus 360.

Since there are many different varieties of Vundo Trojans, symptoms of Vundo vary widely, ranging from the relatively benign to the severe. Almost all varieties of Vundo feature some sort of pop-up advertising as well as rooting themselves to make them difficult to delete.

Most antivirus programs are not able to block this infection. Some antivirus programs such as McAfee VirusScan and VundoFix may be able to remove the Trojan, however sometimes it is not able to, depending on what happens and how much damage the Trojan did.


Types of Trojan horse payloads are almost always designed to cause harm, but can sometimes be harmless. Payloads are classified based on how they breach and damage systems. The six main types of Trojan horse payloads are: Remote Access, Data Destruction, Downloader/dropper, Server Trojan (Proxy, FTP, IRC, Email, HTTP/HTTPS, etc.), Disable security software and Denial-of-service attack (DoS).

Methods of removal Since Trojan horses have a variety of forms, there is no single method to delete them. The simplest approach involves clearing the temporary internet files file and deleting it manually. Normally, antivirus software is able to detect and remove the Trojan automatically. Updated anti-spyware programs are also efficient against this threat. Most Trojans also hide in registries and processes. It is generally more difficult to remove a Trojan if the computer has been rebooted after the Trojan has been activated. Installing good quality anti virus software, keeping the virus definitions up-to-date and running a virus scam daily is the minimum that should be done to protect against Trojans.

Rogue Infiltrants Viruses that are displayed as "Anti-Virus programs" are known as Rogue Viruses. Rogue viruses have the prime intention of collecting money from a victim, and/or harming his or her computer with infections. The infections installed with rogue viruses make the user's computer slow, so they actually believe an infection exists, which it does. Trojan viruses frequently trick users with pop-up messages that get them to purchase "virus removal software" which of course does nothing of the kind.

Privacy-invasive software is a type of computer software that ignores user privacy and that is distributed with a specific intent, often of a commercial nature. Three examples of privacy-invasive software are adware, spyware and content hijacking programs. Keyloggers record user keystrokes in order to monitor user behavior. Self-replicating malware downloads and spreads disorder in systems and networks. Data-harvesting software that is programmed to harvest e-mail addresses, which results in spam e-mail messages that flood networks and mail servers with unsolicited commercial content (which are frequently scams). Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices.

Employee monitoring software is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location. It is normally deployed over a business network and allows for easy centralized log viewing via one central networked PC.

Techniques include: Logging all keystrokes along with the window name they are typed. Capturing and logging sent and received E-mails. Logging all websites visited. Monitoring and logging all applications that a user runs. Record the documents and files a user opens and views.

Malware: Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. Malware's most common pathway from criminals to users is through the Internet. Primarily via email and WWW web sites.


You might be surprised at all of the creepy, unknown "stuff" that's running on your servers and workstations. This is especially true if you don't have a process in place to audit your computing equipment periodically. We've seen (many) cases where production servers had been exploited and a rootkit run on them. And in some cases these servers were unknowing IRC chat servers with hundreds of on-going connections! Vulnerable web servers that were exploited and had subdomains created on them by hackers that housed hundreds of links to porn sites. And worse. Workstations with viruses, Trojans and bots that were sending out SPAM by the trainload. And all the user knew was that the PC had "gotten slower" recently.

Easyrider LAN Pro can come in and audit your enterprise in an organized way to see what's going on. Think of the performance boosts you are going to see once all of those non-production programs and services are removed from your network! Having firewalls and anti virus software deployed is no guarantee that there aren't LOT'S of infected computing gear in your enterprise. In fact, almost all of the sites where we have found major issues did indeed have these provisions installed and IT thought their network was 100% secure. Surprise! :(

Next in the security white paper series:

Firewall White Paper
Virus White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Port Scanning White Paper
Shelfware White Paper



Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro