Types of Trojans
Remote Access Trojans These commonly-used Trojans grant full access of your computer to the attacker. The attacker can rummage through your entire computer and take what he wants.
Password copying Trojans
These Trojans copy all the passwords and email them to the attacker. These are used by attackers when they want to get some information about the user.
Keyloggers
Keyloggers are programs that record keystrokes and send the data to the attacker, who then sifts through the information to retrieve passwords and credit card numbers. Keyloggers can record keystrokes online or offline.
Malicious Trojans
Such Trojans just destroy files from a victim’s system. They are set to automatically delete large volumes of files in seconds. These Trojans are typically set to activate at a particular time and date and can be controlled by the attacker.
Traffic-generating Trojans
Such Trojans just flood the victim’s computer with Internet traffic causing his Internet service to break down.
Proxy Trojans
These Trojans covert the victim’s system into a proxy server that can be used by any hacker around the world. Attackers can use the victim’s computer to attack other computers, access banned sites, send out chain emails, and more.
- See more at: http://trojan-virus.com/what-is-a-trojan-virus/#sthash.6fNhXWNN.dpuf