As another example, an intruder may forge an advisory from a security organization that instructs system administrators to obtain and install a patch. This can be especially dangerous if the user has administrative access to the operating system because the Trojan horse can do anything the administrator can.
Trojan horses have the same level of privileges to perform functions as the user executing the program. This means that Trojan horses can delete files that the user can delete; transmit to the intruder any files that the user can read; change any files the user can modify; install other programs with the privileges of the user, such as programs that provide unauthorized network access; install viruses; install other Trojan horses; and execute privilege-elevation attacks.
One actual example of Trojan horse disbursement occurred in early 1999. An e-mail was widely distributed which claimed to be a free upgrade to the Microsoft Internet Explorer web browser. The e-mail contained an attached executable program called IE0199.exe. After installation the program would make several modifications to the system and attempts to contact other remote systems.
Using a firewall and virus products can protect businesses from some of the popular Trojan horses, although it is impossible to detect all possible Trojan horses. If you do fall victim to a Trojan horse, some anti-virus software may be able to recognize, remove, and repair the damage from the Trojan horse. However, if an intruder gains access to your system via a Trojan horse, it may be difficult or impossible to establish trust in your system. In these cases you may have to rebuild your system from known good software, changing all passwords, and checking other nearby systems.
Denial of Service.
Denial of service (DoS) attacks are aimed at devices and networks with exposure to the Internet. Their goal is to cripple a device or network so that external users no longer have access to your network resources.