Trojan virus belongs to the virus category, mainly to steal account password information, remotely control the user's computer, destroy the operating system and other operations. Moreover, in order to prevent anti-virus software from killing it, it usually has strong concealment and anti-reconnaissance. After most Trojan viruses are infected, the first attempt is to forcefully shut down the anti-virus software, and then start stealing accounts. Some Trojan viruses will even break the mainstream anti-virus software at home and abroad.
In the recent past, it can be seen from the virus reports released by major anti-virus software vendors that the Trojan virus is currently flooding the Internet and has formed a complete virus industry chain. How does it invade the computer? How to prevent it as an ordinary netizen?
There are many users who find that their computer has a problem, but they can't find the reason. It is a Trojan, but it can't find it. What is the problem, and later it was detected that when the data was uploaded, the Trojan virus hidden in the picture was found in the picture, and finally it was pulled out. Take a look at the specific content:
The attacker used the Microsoft GDIplus security vulnerability to hide the Trojan in the picture. Note that it is hidden rather than bundled. This is different from the previous disguise as a Trojan, which lures netizens to click, but The real picture turned into a Trojan. Affected by the Microsoft GDIplus security vulnerability, almost all browsers, instant messenger tools, Office programs, and viewing software may become channels for Trojans. Just browse through the browser, view the software open, or even view these images in QQ, MSN, email, Office documents, you will be recruited! You are a QQ expression or a PNG picture with tens of thousands of layers, see You are on the Trojan! This security vulnerability is Microsoft's GDIplus image vulnerability, which is the biggest security vulnerability in Microsoft's history.
GDIplus is a graphical device interface that provides two-dimensional vector graphics, images, and layouts for applications and programmers. GdiPlus.dll provides access to a variety of graphical methods through a class-based API. It has an integer overflow vulnerability when parsing specially crafted BMP files. An attacker who exploits this vulnerability has complete control over the system, which can be used to install more Trojans; view, change, or delete data; or create new ones with full user rights. account. This GDIplus vulnerability is very serious, similar to previous cursor vulnerabilities and wmf vulnerabilities, but it covers a wide range and covers almost all graphic formats.
Understand the above problems, computer users should be careful to take the pictures they have received, must first kill the virus and then open, in case of the move, but this problem can also be solved, because Microsoft Special patches for GDIplus security vulnerabilities have also appeared, and as long as the download is run, the problem is saved.
Develop good online habits. A large number of Trojans are spread through illegal websites, etc.
Improve personal safety awareness. If you receive unfamiliar mail, don't open the attachment, don't click on the QQ or MSN message with the link, insert the U disk and then copy the file first, etc.;
If the computer is infected with Trojan virus, first upgrade the anti-virus software. After the latest version, perform a full-scale anti-virus. You can also seek help from professional anti-virus vendors such as Rising.
The Trojan virus is indeed a huge hazard, but I believe that as the country continues to crack down on computer viruses and cybercrime and related laws, the underground Trojan industry chain will gradually be eliminated.
Develop the above good habits, you can prevent your computer from infecting Trojans, hurry.
Windows Update is a good program, providing the most basic security for the system security, but it
Many Windows XP system users know that dial-up connection to the Internet, dial-up connection is als
WinXP is a classic style, many notebook users like to install XP system. The XP systems computer key
Everyone knows the concept of gateway. If your IE browser 192.168.1.1 cant be opene
WinXP desktop how to find the lost camera icon
The computer does not need to crash. The master can help you uncover the secret
After the computer is recruited, those effective methods
Share and modify the network settings of Microsoft Windows XP system
Share the secrets of WinXP hotkey small holes
Word document insert file prompt "Create Word object error" how to deal with?
How to solve the problem of WinXP computer monitor blur
WinXP always enters the screensaver skills
XP system boot prompts did not find COMRes.dll how to solve?
Teach you how to start remote desktop connection
How to break down XP device manager application skills three
Master summary of those methods that hide superusers
Win10 combines the right-click menu WinRAR option into an option method
DNS resolution service method and error resolution method
Windows 7 right-click menu integrated copy and move
The rookie must see: Explain the Exchange 2003 cluster features
FTP upload file often interrupts or times out the solution
The method of the system faster win 7 Open command prompt
Win8 system prompts no solution for installing any audio output device