The term Trojan Horse probably sounds familiar, regardless of whether you're a technical genius (or a Greek scholar!) but if you're wondering exactly what one is and what effect it can have on your PC, you've come to the right place.
Trojan Horses are a particularly nasty strain of malware (contrary to popular myth, they are not actually a virus, despite often being referred to as such – viruses replicate themselves whereas Trojans do not). You should try and avoid being infected by a Trojan at all costs as they can do some real damage to your data. And yes, you did read that correctly – I said you should try and avoid them: that's because if you do have a Trojan infection, chances are, you could be to blame. Most Trojans do not create multiple processes and do not slow down computers as much as this particular fake Google Chrome virus. It's clearly less sophisticated than other Trojans in the wild right now and that's a good thing for users because they can quickly notice that something isn't right.
How does this Trojan Horse infect your computer?
The clue to how Trojan Horse malware works is in its name. And yes, you would be correct in thinking that this is something to do with the ancient Greek myth. If you remember the story from your schooldays, you'll recall how the ancient Greeks infiltrated the city of Troy by hiding their soldiers inside a specially constructed, giant wooden horse. They gave this horse to the Trojans, ostensibly as a peace offering – and once it was wheeled inside the city walls, the Greek army waited until darkness, crept out of the horse and flung open the city gates to let their fellow infantrymen inside to cause chaos. And it is this plan of attack which gives its name to our modern day Trojan Horses. They operate by fooling you into thinking they are a genuine program, convince you to install them on your computer – and then attack you from within.
Where does it come from?
You may come across a Trojan Horse in a number of different ways. Some cyber criminals use spam emails to disseminate them. Once you've opened the mail and clicked upon an attachment or file contained within, you've unleashed the malware onto your PC. Once the .exe file has run and then installed itself, the server used by the programmer will automatically launch every time you log on to your computer.
Trojan Horses can also be disguised as programs that look as if they are useful. For example, Google Chrome.
What can this Trojan Horse do and how do I protect myself?
Trojan Horses don't pull any punches when it comes to causing havoc. They corrupt your data, making it impossible to access it – and all for no reason – it's simply because they can. What a way to lose your files or documents. This particular Trojan horse that creates multiple malicious instances and Google Chrome processes doesn't corrupt files but it can install more malware on your computer and steal valuable data.
To protect yourself from this nightmare scenario you need to install a reputable anti-malware program on your PC. Also, do not open emails if you don't know who sent them – and if you do so by accident NEVER open any attachments!
To remove fake Google Chrome processes and related malware from your computer, please follow the steps in the removal guide below. If you have any questions, please leave a comment down below. Good luck and be safe online!
Written by Michael Kaur, http://delmalware.blogspot.com
Fake Google Chrome Processes Removal Guide:
1. First of all, download anti-malware software and run a full system scan. It will detect and remove this infection from your computer. You may then follow the manual removal instructions below to remove the leftover traces of this malware. Hopefully you won't have to do that.
2. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.
3. Wait for the scan and disinfection process to be over. Then click Continue. Please reboot your computer after the disinfection is over.