Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Trojan Arc-Bomb

By: Mohamed Ibrahim

Treatment

Trojan ArcBomb is difficult to detect and remove manually. However, most anti-malware programs are able to detect and remove it successfully. Scanning your computer with one such anti-malware will remove Trojan ArcBomb and any files infected by it. Unfortunately, scanning and removing the threat alone will not fix the modifications Trojan-ArcBomb made to your Windows Registry. You will need to clean Windows Registry by removing invalid registry entries using a registry cleaner program.

Culture

  • Research shows that there were 27 million different types of malware generated in 2013.
  • That is 74,000 malware strains each day.
  • 21% of these malicious software are Trojans.
  • One lesser none Trojan is the Trojan Arc bomb.

What do These Bombs Do?

Disguising Itself

  • Because the Trojan Arc-Bomb is a Trojan, it disguises itself to look harmless. So the program looks harmless but is really harmful.

  • Once the harmless looking source is activated the virus has already began attacking.

How do people get these Trojans?

Like other trojans, Trojan-ArcBomb gains entry through source programs carrying a Trojan payload that you unknowingly install. Such as:

  • Malicious websites designed specifically to inject Trojans
  • Legitimate websites infected with Trojans
  • Email attachments
  • Fake updates presented for installed software
  • Peer-to-peer sharing software
  • Malicious video players and codecs
  • Free downloadable games
  • Malcrafted archive headers in an archive can cause a specific packer to crash when processing the archive contents.
  • Repeating data is when the data is copied over and over multiple times in a server.
  • A large number of identical files in an archive will also have very little impact on the size of the archive when they are packed using special methods

Why is it Called the Trojan Arc-Bomb?

The Trojan Arc-Bomb uses three types of "bombs''.

  • maliciously crafted archive headers
  • repeating data
  • identical files in the archive

What does the Trojan Arc-Bomb disguise itself to look Like ?

  • Trojan Arc-Bombs have been known to disguise themselves as a computer game. Although they have been known to be video games they have been also known to disguise themselves as different program such as a word document or PowerPoint.

How does the Trojan Arc-Bomb Work?

What does Trojan Arc-Bomb stand for?

  • The Trojan part stands for a Trojan Horse virus.

  • The arc-bomb part stands for archive bombs because the "bombs attack the archive in the computer.

What does the Trojan Arc-Bomb Do?

  • The Trojan Arc-Bomb works like a regular Trojan horse virus. The program claims to do one thing but instead does damage when you run it.

  • The Trojan Arc-Bomb has no way to replicate automatically.

  • When it is executed, it carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
  • These Trojans are archives designed to freeze or slow performance or to flood the disk with a large amount of empty data when an attempt is made to unpack the archived data.

  • So-called archive bombs create a threat for mail servers when an processing system is used to process incoming data.

  • An archive bomb can simply crash the server.

What is the Trojan Arc-Bomb?

  • A Trojan Arc-Bomb is a type of Trojan Horse computer virus.
  • The Trojan Arc-Bomb uses "bombs".
  • The Trojan Arc-Bomb disguises itself just like a regular Trojan Horse.
Learn more about creating dynamic, engaging presentations with Prezi