Nearly everyone is familiar with the story of the Trojan horse. In order to end the 10-year siege on Troy, the Greek army engaged in malicious subterfuge, constructing a huge, wooden horse as a “peace offering” and leaving it at the gates of Troy before sailing away. The Trojans brought the horse inside the impenetrable walls of the city, unaware that members of the Greek army were hidden within. That night, as the Trojan forces slept, the Greeks flung open the gates to the city and let in the army that had only pretended to sail home. Troy was sacked and the war ended.
Today, the term “Trojan horse” bears a different meaning, but the same implication. It has become synonymous with a type of malware that infiltrates computer networks in the guise of harmless or even useful files. Users let the Trojan horse into the city, so to speak, usually by clicking a link or downloading and running a file. Once the malware has been executed, it spreads through the affected computer and even the associated network, taking over files according to its programming. In many cases it also creates a backdoor where hackers can gain access to steal or destroy data. Although ETTE can help to treat computers and networks suffering from Trojan horses, the best defense is a modern multi-faceted approach. This malware can only gain entry if users allow them in.
There are many different types of Trojan horse viruses, some of them truly insidious. The CryptoLocker virus is one the most current ones, causing significant headaches for many businesses and individuals. This type of malware is known as ransomware because it annexes files with specific extensions (doc, ppt, and jpg, amongst others), encrypts the data, and then asks users to pay a fee to retrieve their files, often with a time limit attached to the transaction. Even with stellar IT support, users may not be able to move fast enough to save their files, thus prompting them to pay or lose their data.
As you can imagine, this sort of malware could wreak havoc on your business. Once a Trojan horse is in the system, it not only spreads to infect and protect itself, but, with proper coding, it can infiltrate the network your device is connected to and even send itself to your contact list, potentially infecting the systems of any personal or professional connections that open the file. The only good news is that crypto malware is relatively easy to avoid when you know what to look for. There are a few ways you can protect yourself against the damage that may be done by CryptoLocker.
The first thing you should know about Crypto malware is that it requires a couple of steps to install. First, users have to download a zip file contained in an email. Then they must use a password provided in the email to open the zip file. This is when the virus activates. The main problem is that the email could come from a trusted source that has been infected. Obviously, employees should never download or open files in emails from unknown sources. But you might also want to develop a policy that includes avoiding any file attachments. If this isn’t feasible for your business, there are other options.
You can start by disabling hidden file extensions in every device running windows. Trojan horses are executable files (.exe), but they are adept at hiding the file extension. When you reveal the type of file, users will understand that they shouldn’t download or open them. You should also hire a managed services provider like ETTE to implement and manage a hosted backup solution for you. Malware attacks are not unavoidable, and you can definitely train employees to behave in a safe and responsible manner, but you should be prepared just in case your network does get infected. We can provide you with the secure backup options your company needs to minimize the damage caused by malware.
Such diligence can cost you, but it’s a lot better than facing the damage a Trojan horse can cause and potentially compromising the future of your business in the process.