Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
An FTP Trojan is a special type of Trojan allowing the attacker to access a machine using the FTP Protocol.
Generally, a Trojan is a type of virus entering a system in an undetected manner and accessing all confidential data, thereby causing trouble by compromising or exposing data. One of the ways a Trojan can manifest itself is in the form of a genuine program performing malicious functions.
An FTP Trojan installs an FTP server on the victim’s machine allowing the attacker to gain access to sensitive data through the FTP Protocol. The Trojan opens port 21 and makes it accessible to the attacker or a group of individuals. Some password attacks can also be employed where only the attacker gains access to the system. The system tries to download and upload files from the victim system.
The types of information affected include:
Credit card information
All types of username and password information
Email addresses to propagate
Using the victim’s computer as a source for propagating other attacks
Securing a Computer Against Trojan Attack
Anti-virus gateway protection can be employed to detect Trojans incoming through HTTP, email or FTP. It is recommended to use multiple virus engines to ensure that different types of Trojans are easily recognized and dealt with. A single virus engine can never recognize all Trojans.
The following are some steps to prevent or reduce the presence of Trojans:
Download only from trusted websites.
Check the file extension before opening it. (It is possible that a jpg file has been masked with an .exe extension, which can activate the Trojan by clicking it.)
Avoid executing web-based scripts and automated commands mentioned online without fully understanding their effects.
Download .exe files only from trusted sources.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day