What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (2024)

Download Ebook - Use AI to Detect Malware

What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (1) What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (2) What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (3)

What Is a Trojan Horse Virus?

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.

A simple way to answer the question "what is Trojan" is it is a type of malware that typically gets hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device. Once downloaded, the malicious code will execute the task the attacker designed it for, such as gain backdoor access to corporate systems, spy on users’ online activity, or steal sensitive data.

Indications of a Trojan being active on a device include unusual activity such as computer settings being changed unexpectedly.

History of the Trojan Horse

The original story of the Trojan horse can be found in the Aeneid by Virgil and the Odyssey by Homer. In the story, the enemies of the city of Troy were able to get inside the city gates using a horse they pretended was a gift. The soldiers hid inside the huge wooden horse and once inside, they climbed out and let the other soldiers in.

There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber attacks:

  • The Trojan horse was a unique solution to the target’s defenses. In the original story, the attackers had laid siege to the city for 10 years and hadn’t succeeded in defeating it. The Trojan horse gave them the access they had been wanting for a decade. A Trojan virus, similarly, can be a good way to get behind an otherwise tight set of defenses.
  • The Trojan horse appeared to be a legitimate gift. In a similar vein, a Trojan virus looks like legitimate software.
  • The soldiers in the Trojan horse controlled the city’s defense system. With a Trojan virus, the malware takes control of your computer, potentially leaving it vulnerable to other “invaders.”

What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (4)

How Do Trojans Work?

Unlike computer viruses, aTrojan horsecannot manifest by itself, so it needs a user to download the server side of the application for it to work. This means the executable (.exe) file should be implemented and the program installed for the Trojan to attack a device’s system.

A Trojan virus spreads through legitimate-looking emails and files attached to emails, which are spammed to reach the inboxes of as many people as possible. When the email is opened and the malicious attachment is downloaded, the Trojan server will install and automatically run every time the infected device is turned on.

Devices can also be infected by a Trojan through social engineering tactics, which cyber criminals use to coerce users into downloading a malicious application. The malicious file could be hidden in banner advertisem*nts, pop-up advertisem*nts, or links on websites.

A computer infected by Trojan malware can also spread it to other computers. A cyber criminal turns the device into a zombie computer, which means they have remote control of it without the user knowing. Hackers can then use the zombie computer to continue sharing malware across a network of devices, known as a botnet.

For example, a user might receive an email from someone they know, which includes an attachment that also looks legitimate. However, the attachment contains malicious code that executes and installs the Trojan on their device. The user often will not know anything untoward has occurred, as their computer may continue to work normally with no signs of it having been infected.

The malware will reside undetected until the user takes a certain action, such as visiting a certain website or banking app. This will activate the malicious code, and the Trojan will carry out the hacker’s desired action. Depending on the type of Trojan and how it was created, the malware may delete itself, return to being dormant, or remain active on the device.

Trojans can also attack and infect smartphones and tablets using a strand of mobile malware. This could occur through the attacker redirecting traffic to a device connected to a Wi-Fi network and then using it to launch cyberattacks.

Most Common Types of Trojan Malware

There are many types ofTrojan horse virusesthat cyber criminals use to carry out different actions and different attack methods. The most common types of Trojan used include:

  1. Backdoor Trojan:A backdoor Trojan enables an attacker to gain remote access to a computer and take control of it using a backdoor. This enables the malicious actor to do whatever they want on the device, such as deleting files, rebooting the computer, stealing data, or uploading malware. A backdoor Trojan is frequently used to create a botnet through a network of zombie computers.
  2. Banker Trojan:A banker Trojan is designed to target users’ banking accounts and financial information. It attempts to steal account data for credit and debit cards, e-payment systems, and online banking systems.
  3. Distributed denial-of-service (DDoS) Trojan:These Trojan programs carry out attacks that overload a network with traffic. It will send multiple requests from a computer or a group of computers to overwhelm a target web address and cause a denial of service.
  4. Downloader Trojan:A downloader Trojan targets a computer that has already been infected by malware, then downloads and installs more malicious programs to it. This could be additional Trojans or other types of malware like adware.
  5. Exploit Trojan:An exploit malware program contains code or data that takes advantage of specific vulnerabilities within an application or computer system. The cyber criminal will target users through a method like a phishing attack, then use the code in the program to exploit a known vulnerability.
  6. Fake antivirus Trojan:A fake antivirus Trojan simulates the actions of legitimate antivirus software. The Trojan is designed to detect and remove threats like a regular antivirus program, then extort money from users for removing threats that may be nonexistent.
  7. Game-thief Trojan:A game-thief Trojan is specifically designed to steal user account information from people playing online games.
  8. Instant messaging (IM) Trojan:This type of Trojan targets IM services to steal users’ logins and passwords. It targets popular messaging platforms such as AOL Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager.
  9. Infostealer Trojan:This malware can either be used to install Trojans or prevent the user from detecting the existence of a malicious program. The components of infostealer Trojans can make it difficult for antivirus systems to discover them in scans.
  10. Mailfinder Trojan:A mailfinder Trojan aims to harvest and steal email addresses that have been stored on a computer.
  11. Ransom Trojan:Ransom Trojans seek to impair a computer’s performance or block data on the device so that the user can no longer access or use it. The attacker will then hold the user or organization ransom until they pay a ransom fee to undo the device damage or unlock the affected data.
  12. Remote access Trojan:Similar to a backdoor Trojan, this strand of malware gives the attacker full control of a user’s computer. The cyber criminal maintains access to the device through a remote network connection, which they use to steal information or spy on a user.
  13. Rootkit Trojan:A rootkit is a type of malware that conceals itself on a user’s computer. Its purpose is to stop malicious programs from being detected, which enables malware to remain active on an infected computer for a longer period.
  14. Short message service (SMS) Trojan:An SMS Trojan infects mobile devices and is capable of sending and intercepting text messages. This includes sending messages to premium-rate phone numbers, which increases the costs on a user’s phone bill.
  15. Spy Trojan:Spy Trojans are designed to sit on a user’s computer and spy on their activity. This includes logging their keyboard actions, taking screenshots, accessing the applications they use, and tracking login data.
  16. SUNBURST: The SUNBURST trojan virus was released on numerous SolarWinds Orion Platform. Victims were compromised by trojanized versions of a legitimateSolarWinds digitally signed file named: SolarWinds.Orion.Core.BusinessLayer.dll. The trojanized file is a backdoor. Once on a target machine, it remains dormant for a two-week period and will then retrieve commands that allow it to transfer, execute, perform reconnaissance, reboot and halt system services. Communication occurs over http to predetermined URI's.

How To Recognize a Trojan Virus

A Trojan horse virus can often remain on a device for months without the user knowing their computer has been infected. However, telltale signs of the presence of a Trojan include computer settings suddenly changing, a loss in computer performance, or unusual activity taking place. The best way to recognize a Trojan is to search a device using a Trojan scanner or malware-removal software.

How To Protect Yourself from Trojan Viruses

A Trojan horse virus can often remain on a device for months without the user knowing their computer has been infected. However, telltale signs of the presence of a Trojan include computer settings suddenly changing, a loss in computer performance, or unusual activity taking place. The best way to recognize a Trojan is to search a device using a Trojan scanner or malware-removal software.

Examples of Trojan Horse Virus Attacks

Trojan attacks have been responsible for causing major damage by infecting computers and stealing user data. Well-known examples of Trojans include:

  1. Rakhni Trojan:The Rakhni Trojan delivers ransomware or a cryptojacker tool—which enables an attacker to use a device to mine cryptocurrency—to infect devices.
  2. Tiny Banker:Tiny Banker enables hackers to steal users’ financial details. It was discovered when it infected at least 20 U.S. banks.
  3. Zeus or Zbot:Zeus is a toolkit that targets financial services and enables hackers to build their own Trojan malware. The source code uses techniques like form grabbing and keystroke logging to steal user credentials and financial details.

Quick Links

Free Product DemoExplore key features and capabilities, and experience user interfaces.
Resource CenterDownload from a wide range of educational material and documents.
Free TrialsTest our products and solutions.
Contact SalesHave a question? We're here to help.
What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet (2024)

FAQs

What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet? ›

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.

Why is it called Trojan malware? ›

In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

What is the meaning of malware? ›

Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

What is malware and how to prevent it? ›

Malware is any type of software that causes damage to a system or allows access to unauthorized data from viruses that replicate themselves throughout a system. You can prevent malware with anti-virus software, email security software, and training.

What was the first Trojan horse virus? ›

Called ANIMAL, the first Trojan (although there is some debate as to whether this was a Trojan, or simply another virus) was developed by computer programmer John Walker in 1975, according to Fourmilab.

What is the difference between Trojan horse and malware? ›

A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network.

What is the Trojan virus? ›

Trojan viruses are a type of malware that invade your computer disguised as real, operational programs. Once a trojan is inside your system, it can perform destructive actions before you even know it's there.

What is the most common way a hacker will get malware into your computer? ›

By far the most common method for hackers and state-sponsored hacking organizations to spread malware is through phishing emails. Hackers have become incredibly skilled at crafting emails that trick employees into clicking on links or downloading a file that contains malicious code.

What is the best way to get rid of malware? ›

Scan your device for malware.

Run a malware or security Delete anything it identifies as a problem. You may have to restart your device for the changes to take effect. Run your scan again to make sure everything is clear. If the scan shows there are no more issues, you've likely removed the malware.

How to get rid of a Trojan virus? ›

Follow these steps:
  1. Step 1: Disconnect internet. Before you start removing the Trojan, make sure that you disconnect from the internet. ...
  2. Step 2: Launch antivirus program. ...
  3. Step 3: Remove Trojan in Safe Mode. ...
  4. Step 4: Perform system recovery. ...
  5. Final option: Reinstall Windows 11.
Oct 27, 2023

What is the most famous Trojan virus? ›

The title of the most famous computer virus arguably goes to the infamous ILOVEYOU virus. Released in the year 2000, it wreaked havoc on the digital landscape and set new precedents for the damage caused by cyberattacks.

What is an example of a Trojan horse? ›

Examples of Trojan horse virus attacks

Well-known examples of Trojans include: Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool—which enables an attacker to use a device to mine cryptocurrency—to infect devices. Tiny Banker: Tiny Banker enables hackers to steal users' financial details.

How did Trojan get its name? ›

The term Trojan horse stems from Greek mythology. According to legend, the Greeks built a large wooden horse that the people of Troy pulled into the city. During the night, soldiers who had been hiding inside the horse emerged, opened the city's gates to let their fellow soldiers in and overran the city.

Why are Trojan condoms named Trojan? ›

Merle Leland Youngs, the creator of Trojan condoms, chose the Trojan Helmet (not the horse) as a symbol of strength.

Did the Trojan horse actually happen? ›

At the center of it all was the Greek siege of Troy, and we all know how that ended — with a giant wooden horse and a bunch of gullible Trojans. Or did it? Actually, historians are pretty much unanimous: the Trojan Horse was just a myth, but Troy was certainly a real place.

What does a Trojan represent? ›

: a native or inhabitant of Troy. 2. : one who shows qualities (such as pluck, endurance, or determined energy) attributed to the defenders of ancient Troy. 3. : a merry and often irresponsible or disreputable companion.

Top Articles
JD Young Technologies | Business Solutions | Tulsa, OK
Sharing photos online - protecting yourself against identity theft
Wisconsin Women's Volleyball Team Leaked Pictures
Hertz Car Rental Partnership | Uber
Horned Stone Skull Cozy Grove
Jet Ski Rental Conneaut Lake Pa
Craigslist Chautauqua Ny
Hillside Funeral Home Washington Nc Obituaries
Readyset Ochsner.org
Hartford Healthcare Employee Tools
Conan Exiles Thrall Master Build: Best Attributes, Armor, Skills, More
Curtains - Cheap Ready Made Curtains - Deconovo UK
Forum Phun Extra
Dover Nh Power Outage
Chase Bank Pensacola Fl
Bn9 Weather Radar
Nk 1399
R Baldurs Gate 3
Abga Gestation Calculator
Schooology Fcps
Pioneer Library Overdrive
Miles City Montana Craigslist
Busted! 29 New Arrests in Portsmouth, Ohio – 03/27/22 Scioto County Mugshots
Red Sox Starting Pitcher Tonight
Advance Auto Parts Stock Price | AAP Stock Quote, News, and History | Markets Insider
Emiri's Adventures
Average weekly earnings in Great Britain
Cbs Trade Value Chart Week 10
Myhrconnect Kp
Appleton Post Crescent Today's Obituaries
Soulstone Survivors Igg
Instafeet Login
Can You Buy Pedialyte On Food Stamps
Troy Gamefarm Prices
Kelly Ripa Necklace 2022
Husker Football
Appraisalport Com Dashboard Orders
ACTUALIZACIÓN #8.1.0 DE BATTLEFIELD 2042
Arcanis Secret Santa
Craigslist St Helens
Sherwin Source Intranet
FactoryEye | Enabling data-driven smart manufacturing
Clock Batteries Perhaps Crossword Clue
Runescape Death Guard
Msatlantathickdream
Craigslist Monterrey Ca
Competitive Comparison
Psalm 46 New International Version
Laurel Hubbard’s Olympic dream dies under the world’s gaze
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 5895

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.