01642 06 11 11 Arrange Call

Trojan

Glossary / T

Trojan Definition:

A Trojan, or Trojan horse, is a type of malicious software that disguises itself as a legitimate or harmless application to deceive users into installing it. Once executed, a Trojan can perform a range of malicious activities, such as data theft, Backdoor access, or system control, often without the user’s knowledge.

What is Trojan?

Trojans are designed to trick users by appearing as genuine software, such as utility programs, games, or software updates. Unlike Viruses, Trojans do not replicate themselves but rely on users to install them. Once inside a system, Trojans can operate covertly, allowing attackers to execute commands, steal data, or deploy additional Malware.

Why is Trojan important?

The purpose of a Trojan is to gain unauthorised access to a user’s system, often to steal sensitive information, establish Backdoor access, or control the system remotely. Trojans are a common vector for cyber attacks because they can be tailored for specific targets, delivering various types of payloads depending on the attacker’s objectives.

How does Trojan work?

Trojans are typically distributed through Phishing emails, malicious downloads, or compromised websites. Once downloaded and executed, the Trojan can install itself on the system, often connecting to a command and control (C&C) server to receive instructions. Security software, such as antiVirus programs, is commonly used to detect and prevent Trojan infections, but sophisticated Trojans can evade standard detection methods.

Trojan Examples:

Examples of Trojans include banking Trojans, which capture financial information, and remote access Trojans (RATs), which allow attackers to control infected systems remotely. Notable examples include Zeus, which targeted banking credentials, and Emotet, which spreads additional Malware.

Trojan Issues:

Trojans pose serious risks, as they often operate silently and evade detection. They can lead to Data Breaches, financial loss, and system compromise. Preventative measures include regular software updates, employee training on Phishing awareness, and the use of robust anti-Malware solutions to detect and remove Trojans.

Our Services