Trojan
Overview
A Trojan horse, or just "Trojan", is any malicious computer program which misleads users of its true intent. It acts like a legitimate application program or file to deceive victims into executing or spreading it. When victims execute it, attackers gain unauthorized access to target hosts to steal data, such as usernames, passwords, and encrypted files. Trojan typically serves as a foundation for further attacks.
Suggestion
If a Trojan is detected and the ECS instance has network requests coming from Trojans, the ECS instance has been infected. For example, the ECS instance cloud attempt to send DNS resolution requests related to WannaCry ransomware or to download .exe Trojans. The severity of this type of threat is High. You are advised to perform the following operations:
- Disable the ECS instance that is infected.
- Check whether other hosts on the subnet where the instance resides are infected.
- Purchase HSS.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot