NetTrojan is a Trojan released in 2002 and allows a third party to gain access to your computer. This dangerous infection was regularly updated until 2007. NetTrojan is what is known as a Remote Administration Tool or ART. At first, Remote Administration Tools were benign programs designed to allow their owners to control their own computers from afar. However, hackers soon adapted Remote Administration Tools to work together with Trojans. In this way, NetTrojan can enter your computer and create a passageway through which a criminal can gain access to your computer. Known versions of NetTrojan can infect most Windows operating systems up to Windows XP. Computers running Windows Vista or Windows 7 are probably safe from a classic NetTrojan infection.

NetTrojan Can Be Very Difficult to Detect

The criminals behind NetTrojan have designed it to be very difficult to detect. It will often not show up in an obvious manner in the Task Manager, or display messages like many other kinds of malware. Because of this, ESG team of security researchers recommend keeping watch for signs that your computer has been hijacked:

  • Abnormal activity on your computer. For example, logs showing that your computer has been active while you were not using it, online activity that you did not perform, or abnormal activity from your email or instant messaging account.
  • Changes to your Firewall settings, or system settings in general. Watch for any newly-opened ports. Your Firewall may be disabled altogether.
  • New files appearing on your hard drive; particularly in your Windows system folder.

Because of the way this Trojan hides, ESG security researchers recommend running a full system scan with a legitimate anti-malware program regularly. If you suspect that your computer has been compromised, start up Windows in Safe Mode and do an in-depth scan of all your files.

A NetTrojan Infection Can Have Dangerous Consequences

Giving criminals full access to your computer can have extremely dangerous consequences. This depends almost entirely on the intentions of the person behind the NetTrojan invader, which are usually not very good. According to our ESG malware researchers, the three most common uses of a Trojan such as Net Trojan include uploading malware into your computer, directly monitoring your online activity, and directly using your computer to perform criminal acts. Because of this, the removal of NetTrojan should be a top priority.

File System Details

NetTrojan may create the following file(s):
# File Name Detections
1. fxp.exe


Most Viewed