Trojan Horse Definition & Meaning

A trojan horse, or trojan, is a form of malware that disguises itself as a harmless file or application to mislead users of its true objective. The trojan will be released on the user s device with a click or download of the seemingly innocent program. This allows the malicious code to perform whatever task the attacker intended. Unlike viruses and worms, trojans do not reproduce or self-replicate.

The name for this malware comes from the Greek legend of the Trojan War, in which the Greeks gift the Trojans a giant, wooden horse. After the horse was accepted into Troy s city walls, Greek soldiers emerged from their hiding place within the horse and opened the city gates, which led to the capture of the city.

Types of trojan horses

  • Backdoor allows attackers full access and control of the computer it infects.
  • Banker steals banking account information.
  • Data Sending sends sensitive data from a device to the attacker by searching the device or keylogging.
  • Distributed denial of service (DDoS) uses multiple devices infected by trojans to overwhelm and flood a network which leads to a denial of service.
  • Destructive trojans destroy and delete files.
  • Downloader trojans download and install malicious software and programs.
  • Game-thief steals online gamer s account information.
  • Mailfinder steals email addresses from your mail history.
  • Proxy trojans use the infected computer as a proxy or zombie to conduct illegal activities undetected.
  • Ransom trojans steal data or damage your computer, and the attacker requires a ransom to release your data or repair the damage.
  • Rootkit hides the malware on your device to extend the time that the program can run.
  • SMS infects a mobile device and can send and intercept text messages.

How to avoid trojan horses

As you can see from the list above, trojans can steal sensitive information and cause a lot of serious damage. Fortunately, there are a few steps you can take to avoid this malware:

  • Don t open an attachment or run a program found in an email from an unknown sender.
  • Only download software from sources you fully trust.
  • Avoid clicking on pop-ups that promise free software.
  • Keep your computer and its software up to date.
  • Install and regularly run an antivirus program on your computer.

Signs of a trojan horse

  • Desktop changes
  • Increase of spam or pop-ups
  • Poor device performance
  • Unfamiliar downloads, add-ons, or applications
  • Changes to display color, clarity, or orientation
  • Strange device behavior

KJ Pace
KJ Pace
KJ Pace writes and coordinates content at TechnologyAdvice in Nashville, TN. When she’s not producing content, she enjoys reading, cooking, and playing with her dogs.

Top Articles

Huge List Of Texting and Online Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top...

How To Create A Desktop Shortcut To A Website

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Creating a desktop...

The History Of Windows Operating Systems

Microsoft Windows is a family of operating systems. We look at the history of Microsoft's Windows operating systems (Windows OS) from 1985 to present...

Hotmail [Outlook] Email Accounts

  By Vangie Beal Hotmail is one of the first public webmail services that can be accessed from any web browser. Prior to Hotmail and its...

Cybersecurity Awareness Training Definition...

Cybersecurity awareness training informs employees of the attack surfaces and vectors in their...

Supply Chain Definition &...

A supply chain is a network between an organization and its suppliers to...

Relational Database Definition &...

A relational database stores and connects data in tables and columns, emphasizing the...