Show
What is a Trojan (horse)?Trojan horse malware is a file, program, or piece of code that appears to be legitimate and safe, but is actually malware. Trojans are packaged and delivered inside legitimate software (hence their name), and they’re often designed to spy on victims or steal data. Many Trojans also download additional malware after you install them. The Trojan gets its name from the Trojan Horse in the Greek epic poem The Iliad. In the story, the Greek hero Odysseus hatches a plan to construct a giant wooden horse that his enemies — the Trojans — would receive into their city as a gift. But within the belly of the horse hid a legion of soldiers, who emerged under cover of night to decimate the city of Troy from within. Trojan malware works the same way — it pretends to be something harmless, but it’s just a cover for its real, malicious intent. How do Trojans work?Trojans work by masquerading as legitimate files, with the goal of tricking victims into clicking, opening, or installing them. Once this happens, the Trojan begins installing malware on your device, spying on you, or causing other types of harm. For example, email Trojans will use social engineering techniques to mimic mundane email attachments. The email itself will also seem trustworthy, but it’s actually a fraudulent email sent by a cybercriminal. When you open the attachment, the Trojan activates and starts attacking your device. The deceit is a central part of the Trojan horse definition. Is a Trojan a virus or malware?Trojans are not viruses, but they are a type of malware. People sometimes refer to “Trojan viruses” or “Trojan horse viruses,” but there’s no such thing. That’s due to one critical difference in how viruses and Trojans infect victims. While viruses self-replicate, spreading from one victim to the next, Trojans need you to install them. That distinction is what distinguishes viruses from Trojan horse malware. Of course, viruses and Trojans themselves are both kinds of malware. Trojans aren’t viruses, but they are a type of malware.How to recognize a Trojan attackTrojan horse programs are sneaky, but if you know what to look for, you can recognize the signs of a Trojan attack and begin the process of Trojan removal. Here are the most common signs of a Trojan malware attack:
Avast One automatically detects and blocks Trojans from infecting your devices. And it’ll clear out any infections currently on your machine. Protect yourself from Trojans and any other malware with Avast One, an award-winning antivirus tool. Types of Trojan malwareBackdoor TrojansCybercriminals use backdoor Trojans to give themselves a “backdoor” into your device — a way to access your computer without your knowledge. This backdoor is often used to install more malware, spy on you and collect your data, or rope your computer into a botnet. Banking TrojansBanking Trojans infiltrate your devices and steal your financial login credentials. Hackers use them to crack your banking and other financial accounts. The Zeus Trojan — one of the most infamous Trojans to date — was a banking Trojan. DDoS TrojansDDoS Trojans aim to conscript your device into a botnet: a network of linked devices controlled remotely by a hacker known as a bot herder. They’ll use the botnet to carry out distributed denial of service (DDoS) attacks that shut down other websites and internet services. Dropper or downloader TrojansDroppers are the first stage in a blended threat — a three-part malware package that consists of a dropper, loader, and more maware (often a rootkit). The dropper Trojan infects your device and sets the stage for the loader, which in turn installs a rootkit that gives a hacker access to your device. Other downloader Trojans will install other types of malware. Exploit TrojansThese devious Trojans use exploits — software tricks designed to leverage a known software or hardware vulnerability — to infect your device. Zero-day exploits target vulnerabilities that no one but the exploit creator has discovered yet. Fake antivirus TrojansA dangerous type of scareware, fake AV Trojans pretend to detect viruses and other malware on your device, then urge you to pay for security software — which is either useless or actively malicious. When you pay, the Trojan creator gets your payment details. Gaming TrojansGaming Trojans target online gamers and steal their login info. Cybercriminals can use these to crack the accounts of high-profile players or steal valuable in-game items. Infostealer TrojansData theft is the goal with infostealer Trojans. They’ll comb through your device for sensitive personal data, then send it back to the hacker who attacked you. Cybercriminals can use this data to commit fraud or identity theft. Instant message TrojansTargeting the instant message (IM) apps on your device, IM Trojans hijack your login credentials and help themselves to your contact list. Newer IM apps that use encryption like WhatsApp or Signal are less vulnerable than older services such as Skype or MSN Messenger — but malware is always evolving. Mailfinder TrojansLess of a danger in the era of webmail services like Gmail, mailfinder Trojans target email apps like Microsoft Office and plumb them for email addresses. Cybercriminals can add any plundered email addresses to their spamming or phishing attacks. Ransomware TrojansRansomware is a type of malware that blocks your access to your data or device, then threatens to either publish, permanently withhold, or destroy the data unless you pay a ransom. Ransomware Trojans use deceit to trick victims into activating the ransomware. SMS TrojansSMS Trojans infect mobile devices, usually Android, and either send expensive SMS messages to premium services owned by the cybercriminal, or intercept messages coming to and from your phone. Examples of Trojan horse attacksTrojan horse malware has caused some of the most notorious cyberattacks in history. Here’s a look at several of the most well-known Trojans. ZeuSThe ZeuS Trojan first appeared in 2007 in a data theft attack on the US Department of Transportation. Known mostly as a banking Trojan, ZeuS is commonly used to steal financial information through two browser-based techniques:
Spread largely via phishing emails and automatic drive-by downloads on infected websites, ZeuS eventually infected millions of computers — which is why it was used to create Gameover ZeuS, one of the most notorious botnets of all time. EmotetFirst detected in 2014, Emotet began as a banking Trojan. But after cybercriminals began using it to distribute other malware instead, Emotet made serious waves in cybersecurity. Routinely hailed as one of the most damaging malware strains ever created, Emotet targeted corporate and individual victims alike through massive spam and phishing campaigns. The malware was used to create several botnets, which were then rented out on a malware-as-a-service (MaaS) model to other enterprising cybercriminals. Emotet was finally disrupted in 2021 via a coordinated global law enforcement effort. ShedunTrojans aren’t just for Windows — Shedun is an Android adware Trojan horse that repackages legitimate Android apps with bogus adware, before rehosting them on third-party download portals. When you install the app from one of these sites, you get the adware along with it. Once you install the infected app, you’re spammed with ads that generate revenue for the attacker. Removing the malware from your Android device is very difficult, and most victims opted to buy new devices instead. By 2016, Shedun was reported to have infected over 10 million Android devices. Can Trojans affect mobile devices?Trojans can affect mobile devices as well as desktop and laptop computers. Both Android and iOS have been affected by Trojan horse malware, though Android Trojans are far more common. The GriftHorse Trojan is a recent Android SMS Trojan that signs victims up to premium messaging services to generate revenue for the attacker. So far, it’s impacted over 10 million victims worldwide. GriftHorse disguises itself as legitimate apps — the most popular of which has over 500,000 downloads alone. In 2016, the AceDeceiver iOS Trojan was found to be able to attack non-jailbroken iOS devices. Three separate AceDeceiver apps made it through Apple’s internal review processes and were available for download on the official App Store. Learn how to remove malware from your iPhone so you’re ready if this happens to you. How to remove Trojan malwareThe best way to remove Trojan malware from any device is with specialized Trojan removal software. Removing Trojans is similar to removing viruses and other malware from your computer.
How to prevent Trojan horse attacks
Defend against Trojans with comprehensive securityWhile there are many types of Trojan horse malware, they’re all designed to fool you into installing them. That’s why Trojans can be so hard to detect — they look like legitimate software. The best way to protect yourself against Trojans is with reliable security software that can detect, block, and remove all kinds of malware and viruses automatically. That way, there’s no chance for the Trojan to trick you. Stay Trojan-free today with Avast One, an award-winning antivirus and cybersecurity solution that's 100% free. Is Trojan a virus?A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Is spyware A malware?Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user's consent.
What do you mean by Trojan?Definition of Trojan
(Entry 1 of 2) 1 : a native or inhabitant of Troy. 2 : one who shows qualities (such as pluck, endurance, or determined energy) attributed to the defenders of ancient Troy. 3 : a merry and often irresponsible or disreputable companion.
Which of the following best describes malware that is disguised as a legitimate looking application?Trojans Malware – Malware disguised in what appears to be legitimate software. Once activated, malware Trojans will conduct whatever action they have been programmed to carry out. Unlike viruses and worms, Trojans do not replicate or reproduce through infection.
|