A type of
Trojan horse designed to use the victim’s computer as a
proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.
See also Trojan horse.