A type of Trojan horse
designed to use the victim’s computer
as a proxy server
. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.
See also Trojan horse.