Pin Me

Be Aware of the Threat of Trojans

written by: •edited by: Jean Scheid•updated: 6/29/2011

Downloading a Trojan to your PC from the web or by email can open your computer up to criminal elements looking to steal your personal data, bank details and your passwords. Find out here about Sub7 Trojan downloads.

  • slide 1 of 3

    What Is the Sub7 Trojan?

    The Sub7 Trojan horse is a piece of malicious software that can find its way onto your PC and leave you system wide open to attack and control from external sources.

    One of the most well-known Trojans, users can be infected by Sub7 from downloads, emails, or even from an infected removable or network disk drive.

    The dangers of such an infection are obvious – once it is active on your computer, Sub7 can be used to hijack your operating system or steal data. It can also be used to send data to be installed, such as a virus, or a keylogger, in order to record your usernames and passwords.

  • slide 2 of 3

    Avoiding Sub7 Trojan Downloads

    You should be aware of the many ways in which a Trojan can find its way onto your PC. While basic security isn’t taught in the manual of your desktop or laptop computer when you unpack it, there are certain things that you need to know from the start.

    Sub 7 Trojan downloads to your PC via many means, including USB sticks A Trojan horse (and indeed any malicious software) can infect from a range of sources.

    For instance, it might come via an email as an attachment. With a modern email client and/or a suitable email inbox scanning utility you should be able to detect a Sub7 Trojan download before it becomes active.

    Many Trojans infect PCs by being bundled in with a seemingly innocuous download from the web. It might be found in a piece of software from a popular download site or from a P2P filesharing network. If you use these types of services, you should employ online scan tools and the most recent version of your favorite browser to check for malware, as well as a peer-to-peer data checking utility such as PeerGuardian. Updating your browser should also protect you from being infected by the Trojan via exploits in older versions.

    Before the Internet became a part of so many people’s lives, Trojans commonly found their way from computer to computer via removable media such as a floppy disk or CD, as well as USB Flash sticks and external hard disk drives. They might also infect PCs by hiding on a network drive within a corporate environment.

    (Image by author)

  • slide 3 of 3

    Sub7 and What to do if you Suspect Intrusion

    If your PC becomes infected with the Sub7 Trojan, the malware will open a backdoor on your PC – an unmonitored port – and “phone home," allowing the hacker responsible for the attack to add and delete data on your computer, use a keylogger to record your credit card details, personal details, usernames, email addresses and passwords as you enter them into web forms and documents, and add further malware.

    Detecting a Trojan is difficult – only by observing the behavior of your PC when idle, and checking your finances for any unusual transactions can you begin to suspect trouble.

    As such, running regular checks with competent antivirus, anti-malware and anti-spyware utilities should become a habitual process, thereby protecting you from potential financial loss.

Additional Info