
Threats to computer security 23
These programs save programs
containing other Trojan programs on the
computer's disk and then install them.
Intruders can use Trojans-Droppers:
install a malware programs without the
user's knowledge: trojans-droppers do
not display any messages or do display
false messages, for example, notifying
about an error in the archive or about
using the wrong version of the
operating system;
protect another known malware
program from being detected: not any
anti-virus program can detect a
malware program located inside a
trojan-dropper.
They notify the intruder that the infected
computer is connected; and then - transfer
information about such computer to the
intruder, including: IP address, number of
an open port or the e-mail address. They
communicate to the intruder by e-mail, via
FTP, by accessing the intruder's web
page or using other methods.
Trojans-notifiers are often used in sets
comprised of various Trojan programs.
They notify the intruder that other Trojan
programs are successfully installed on the
user's computer.
They allow the intruder to access web
pages anonymously using the user's
computer and are often used to send
spam.
Comentarios a estos manuales