Home Malware Programs Backdoors NetTrojan

NetTrojan

Posted: April 9, 2005

NetTrojan is a Trojan designed for the purpose of letting remote attackers control your PC. Primary symptoms of NetTrojan infection and corresponding remote control include unusual system resource allocation, the presence of strange processes in memory and exceptions created in your firewall or a firewall that's been entirely deactivated. The level of control over your PC that NetTrojan grants can allow criminals to steal all information on your computer or cause it to perform any number of self-damaging actions, which makes removing NetTrojan in short order paramount to maintaining a safe working environment.

NetTrojan is a 'Golden Oldie' of Remote Attack-Based Threats

NetTrojan is relatively old as far as Trojans go, with most major sources reporting the origin of NetTrojan in 2002 and newer versions stopping at 2007. Conceived by the Brazilian hacker ThundeR GoD, NetTrojan is a malicious version of a Remote Administration Tool that lets remote PC users control a computer.

Many Remote Administration Tools are benevolent, but NetTrojan, unfortunately, abuses its capabilities to allow remote criminals full access to your PC. Computers running most Windows operating systems are in danger of being infected by NetTrojan – Windows 95, 98, 200, Me, NT and XP are all known targets.

NetTrojan is also known as a Distributed Trojan Home Network or DHTN. Confirmed paths of infection by NetTrojan include spam emails and infected files shared over networks. As a Remote Administration Tool (or RAT), NetTrojan tries to avoid notice while offering the remote attacker various options for the configuration to make obtaining an iron grip over your PC even easier.

Probable Signs of a NetTrojan Threat

Getting infected by NetTrojan may show relatively few signs, since NetTrojan tries to avoid your notice. Stay on the alert for:

  • Changes to your firewall. Your firewall may be deactivated completely, or NetTrojan may simply create exceptions that allow NetTrojan to ignore the firewall.
  • Unauthorized port-based traffic. The exact port that NetTrojan uses can be reconfigured by the remote attacker.
  • Strange system resource allocation and the presence of unusual memory processes in the Windows Task Manager. This includes duplicates of known safe processes as well as processes that use unfamiliar names.
  • The appearance of unusual files or folders on your PC, particularly in your Windows system folders.

Any remote attacker that's prepared to use NetTrojan to its full extent may violate any and all information contained on your computer, as well as force your computer to perform malicious tasks. You should consider any appearance of a NetTrojan infection to be a sign to head straight into Safe Mode and the most readily-available anti-malware scanner. Otherwise, you're simply forfeiting absolute control of your PC over to a remote criminal by dint of NetTrojan, even if there aren't any obvious signs of abnormal computer behavior.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 fxp.exe
Loading...