{"id":1319,"date":"2020-08-17T10:37:00","date_gmt":"2020-08-17T10:37:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1319"},"modified":"2021-01-12T11:51:17","modified_gmt":"2021-01-12T11:51:17","slug":"what-is-a-trojan-horse-in-computer-terms","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/","title":{"rendered":"What Is a Trojan Horse in Computer Terms?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Explore what trojan horses are \u2014 their invasion techniques, the most common types, the damage they cause, and how can you protect your device &amp; organization from trojan attacks<\/h2>\n\n\n\n<p>Ever found yourself wondering \u201cwhat is a trojan horse?\u201d or \u201cwhat does \u2018trojan horse\u2019 mean when it comes to computers?\u201d That\u2019s probably because there seems to be a lot of confusion in terms of classifying trojans as malware or a type of virus and people often lump viruses, trojans, and other types of malware together in articles. <\/p>\n\n\n\n<p>But don\u2019t worry. We\u2019re here to pull back to the cloak of uncertainty and reveal everything you need to know about trojan malware, trojan bug, and trojan horse attacks. This includes going over:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What a trojan horse is in computer terms (and where the name came from),<\/li><li>Why bad guys like to use trojans,<\/li><li>The 10 common types of trojans,<\/li><li>What to look for to identify whether your device may be infected, and<\/li><li>How to prevent trojans from infecting your computer.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is a Trojan?<\/h2>\n\n\n\n<p>The term \u201ctrojan horse\u201d (or just \u201ctrojan\u201d for short) refers to malicious software (malware) that\u2019s disguised to look like a legitimate computer program, application, or file. The <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trojan_horse\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology<\/a> (NIST) defines it as:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cA computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>Basically, a <a rel=\"noreferrer noopener\" href=\"https:\/\/owasp.org\/www-community\/attacks\/Trojan_Horse\" target=\"_blank\">trojan author (hacker) creates software with a misleading name<\/a> or corrupts a legitimate program with malicious trojan malware. The trojan malware can be hidden in the files, folders, images, videos, slideshows, etc., too.<\/p>\n\n\n\n<p>Using this ruse, cybercriminals trick innocent users into downloading their corrupt software to infect their devices with malware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Trojans, Worms, and Viruses: What\u2019s the Difference?<\/h3>\n\n\n\n<p>Well, let\u2019s first start by saying that these are all separate (but related) threats. These three types of malicious codes use different routes to reach their destructive goals.<\/p>\n\n\n\n<p>Unlike a computer worm, which self-propagates, <strong>a traditional trojan typically needs a user&#8217;s manual action to get into (and activated on) a host computer<\/strong>. The trojan stays dormant in the compromised program until a user clicks, downloads, or installs it.<\/p>\n\n\n\n<p>Unlike a virus, <strong>traditional trojans can\u2019t replicate themselves<\/strong>. They stay local in the same corrupted program in which its author has stored it. That means it can\u2019t corrupt the other software and programs. <\/p>\n\n\n\n<p>However, modern trojans are frequently combined with viruses or worms. These hybrid trojans replicate themselves and transfer their payloads to all other connected IoT devices, software, USB drives, and browsers.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Origins of \u201cTrojan Horse\u201d in IT Security<img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"502\" src=\"\"><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"771\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-1024x771.jpg\" alt=\"A public domain image of artwork depicting the trojan horse being brought into the city of Troy.\" class=\"wp-image-1320 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-1024x771.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-300x226.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-560x422.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-1536x1157.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-940x708.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image source: <a href=\"https:\/\/www.metmuseum.org\/art\/collection\/search\/336832\" target=\"_blank\" rel=\"noreferrer noopener\">The Metropolitan Museum of Art<\/a>. A public domain image of \u201cThe Trojans Bring the Wooden Horse into Their City\u201d by Italian painter Luca Penni.<\/figcaption><\/figure><\/div>\n\n\n\n<p>The term trojan horse relates to the Greek myth of a massive wooden horse that the Greeks used in the Trojan War.<\/p>\n\n\n\n<p>To summarize: In the Trojan war, the Greeks made a huge wooden horse, hid soldiers in it, and pretended that they left the city of Troy. The people of Troy, Trojans, brought the wooden horse inside the Troy as the symbol of their victory. But in the night, Greek soldiers came out of the wooden horse, opened Troy&#8217;s gates to let the remaining Greek army enter and defeat the city.<\/p>\n\n\n\n<p>The computing world&#8217;s trojan horse got this name because of the malware\u2019s similarly deceptive nature. The user willingly downloads a program thinking it is a harmless, useful program without having a clue that it is loaded with malicious code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Attackers Use Trojans<\/h2>\n\n\n\n<p>Trojan horses damage infected devices in many of the same ways as other types of malware. They\u2019re also instrumental in helping cybercriminals:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Steal and encrypt the data for&nbsp;<a href=\"https:\/\/sectigostore.com\/blog\/5-best-ransomware-protection-tips-to-protect-your-organization\/\">ransomware attacks<\/a>.&nbsp;&nbsp;<\/li><li>Steal login information such as user IDs, email addresses, passwords, security questions, PINs, etc.<\/li><li>Access email clients to send&nbsp;<a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a> in your name.&nbsp;&nbsp;<\/li><li>Steal financial information such as payment card numbers or bank account number for doing financial fraud.<\/li><li>Get access to the web browsers to execute <a href=\"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/\">man-in-the-browser attacks.<\/a><\/li><li><a href=\"https:\/\/www.consumer.ftc.gov\/topics\/identity-theft\" target=\"_blank\" rel=\"noreferrer noopener\">Steal your personally identifiable information (PII) for identity theft<\/a>.<\/li><li>Execute <a href=\"https:\/\/www.thesslstore.com\/blog\/man-in-the-middle-attack\/\">man-in-the-middle<\/a><a href=\"https:\/\/www.thesslstore.com\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\"> attacks<\/a>.<\/li><li>Commit espionage and steal other types of confidential, sensitive, or classified information (such as political data, proprietary research, trade secrets, and military-related data).<\/li><\/ul>\n\n\n\n<p><strong>Server-side attacks<\/strong>: Although most trojans target end user devices instead of servers (websites) or networks, the threats they pose don\u2019t end there. Many major types of <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\">cyber attacks<\/a> against websites and servers \u2014 such as DDoS attacks, brute force attacks, man-in-the-middle attacks, etc. \u2014 take place when trojans comprise user devices to make a botnet army.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trojan Horse Invasion Techniques<\/h2>\n\n\n\n<p>Let\u2019s explore how the attackers manage to install the trojan horse on a device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compromised Software and Apps<\/h3>\n\n\n\n<p>Hackers infect a legitimate executable (.exe) with trojan malware or develop new corrupted software with a deceptive name. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Skyp3.exe (instead of Skype.exe),<\/li><li>$recyble.bin, (instead of Recycle bin)<\/li><li>Instagrarm, (Instead of Instagram)<\/li><li>TikTok-online, (Instead of Tik-Tok)<\/li><li>Nort0n antivirus (Instead of Norton Antivirus)<\/li><\/ul>\n\n\n\n<p>As you can see, these names are written in a way that causes less vigilant users to think they\u2019re legitimate software, apps, or files and download them. To lure unsuspecting users into downloading their infected items, hackers often make them available to download for free. When users install the malicious items, the trojans can then take control of their devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing Emails<\/h3>\n\n\n\n<p>Hackers distribute different <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">types of malware<\/a> via phishing email links and attachments. Phishing emails look like coming from legitimate sources like your bank, an ecommerce company, friends, relatives, the professional circle, or any legit company, but they\u2019re not.<\/p>\n\n\n\n<p>For example, you might think the below email is from PayPal and that the attachment is a benign pdf receipt. However, if you were to download it, the trojan would infiltrate your system.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"352\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery-1024x352.jpg\" alt=\"Screenshot from a PayPal phishing email\" class=\"wp-image-1321 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery-1024x352.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery-300x103.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery-560x193.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery-940x323.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/phishing-email-example-trojan-delivery.jpg 1163w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Pop-Up Messages and Ads<\/h3>\n\n\n\n<p>When users visit an infected or spammy website, they get a variety of pop-ups of lucrative advertisements, fake virus infection threats, tempting gossip articles, shocking news, etc. When users click on such pop-ups, the trojan gets installed in their device.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fake Updates<\/h3>\n\n\n\n<p>When users try to access any video or file online, the website denies their access and asks them to download the latest version of a media player, browser, or other types of software with a given link. However, when they install the program from the link provided in the message, a trojan malware-loaded version of the software gets downloaded in the users&#8217; device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The 10 Common Types of Trojan Horses<\/h2>\n\n\n\n<p>The trojan author develops the payload to exploit the host device in a specific manner. Trojans are typically categorized by their functions. Although all trojans are developed differently, these are some common types of trojan malware that we\u2019ve seen in the past on the internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Botnet Trojans<\/h3>\n\n\n\n<p>These trojans are designed to spread their payloads to other connected devices and make them join a bot network. The trojans\u2019 authors are called botmasters, and they control all of the infected devices via C&amp;C servers. Once a large number of infected devices join the same botnet, the botmaster uses them to execute various cyber attacks (<a href=\"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/\">DDoS attacks<\/a>, brute force attacks, etc.).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Deceptive Antivirus Trojans<\/h3>\n\n\n\n<p>Such trojans send pop ups to users, informing them that their devices are infected with malware. Once the users are convinced that their devices are infected, the attackers sell them fake malware-loaded antivirus software or charge for virus removal services. Check out the following example:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"506\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/antivirus-trojans-deceptive-warnings.png\" alt=\"Screenshot from Malwarebytes of fake antivirus warning messages\" class=\"wp-image-1322 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/antivirus-trojans-deceptive-warnings.png 900w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/antivirus-trojans-deceptive-warnings-300x169.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/antivirus-trojans-deceptive-warnings-560x315.png 560w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>Image Source: <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/11\/psa-tech-support-scams-pop-ups-on-the-rise\/\">Malwareb<\/a><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/11\/psa-tech-support-scams-pop-ups-on-the-rise\/\" target=\"_blank\" rel=\"noreferrer noopener\">y<\/a><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/11\/psa-tech-support-scams-pop-ups-on-the-rise\/\">tes<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Email Corrupting Trojans<\/h3>\n\n\n\n<p>These trojans are made to access the hosts\u2019 email clients. They can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Intercept email communications,<\/li><li>Send the victims\u2019 contact lists to the attackers,<\/li><li>Send phishing emails on behalf of the victims (without the victims&#8217; knowledge) and erase the emails from their sent folders.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. Backdoor\/Remote Access Trojans<\/h3>\n\n\n\n<p>These trojans give remote access of the infected devices to cybercriminals. With this comprehensive access, trojan authors can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Access, modify and transfer files,<\/li><li>Send and receive information with other connected IoT devices,<\/li><li>Reboot the system,<\/li><li>Install or uninstall software, and<\/li><li>Get many other such privileges.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. Ransomware Trojans<\/h3>\n\n\n\n<p>These types of trojans have the ability to encrypt, lock, and delete data. They can lock important programs or even the entire operating system, too. The trojan writers demand extortion money from the victims in exchange for returning access to the data, files, programs, or the entire system. (Although, as you can imagine, even if some victims pay, the bad guys still might not follow through with their promise.) Sometimes, the attackers also threaten to leak the victims\u2019 private data or expose the confidential information if they don\u2019t pay the ransom.<\/p>\n\n\n\n<p>Check out the example below:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"952\" height=\"699\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/ransomware-trojan-message.png\" alt=\"Screenshot of a ransomware notification from a ransomware trojan\" class=\"wp-image-1323 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/ransomware-trojan-message.png 952w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/ransomware-trojan-message-300x220.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/ransomware-trojan-message-560x411.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/ransomware-trojan-message-940x690.png 940w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\" \/><figcaption>Image Sorce: <a href=\"https:\/\/www.pcrisk.com\/removal-guides\/12629-tron-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">pcrisk.com<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">6. Vulnerability Finding Trojans<\/h3>\n\n\n\n<p>After making their way onto targets\u2019 devices, these trojans seek out the vulnerabilities of the operating systems, apps, and software that are installed on them. The trojans then send the lists of vulnerabilities to the trojan operators. Generally, such vulnerabilities are found in outdated versions of programs. This information helps hackers to make further plans of exploiting the devices (and other devices with the same vulnerabilities) based on the nature of their unpatched bugs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Download Enabler Trojans<\/h3>\n\n\n\n<p>Whenever the victim&#8217;s device connects to the internet, these types of trojans download the other type of malware in users&#8217; devices without their consent.<strong>&nbsp;<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Spyware Trojans<\/h3>\n\n\n\n<p>Spyware trojans (also known as spyware) are covert software that attackers can use to monitor the target users\u2019 actions and behaviors. This includes everything from what the users type on their infected devices to the information they transmit via websites (such as personal information, financial data, login credentials, etc.). The spyware users can then use the information to execute identity theft crimes, financial fraud, or ransomware attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. File Transfer Protocol Trojans<\/h3>\n\n\n\n<p>With these types of trojans, attackers use trojans to open port 21 in the host device to access the files via the file transfer protocol (FTP). Once the attackers get access to the FTP folders, they can upload and download malicious files in the victims\u2019 devices remotely.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Security Software Disabler Trojans<\/h3>\n\n\n\n<p>These trojans turn off, disable, or uninstall computer security software such as antivirus, antimalware, or firewalls without the users\u2019 knowledge. So, before the antivirus programs can detect the trojan and its payloads, the attackers turn such security software off. The users think that their devices are still protected by the security software and they trust the infected programs without being suspicious.&nbsp; &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8 Common Signs That You May Have a Trojan Horse in Your Computer or Device<\/h2>\n\n\n\n<p>So, how do you know if your device is infected with a trojan horse? Of course, the immediate answer is that you can use an anti-malware scanner (and some antivirus programs) to check. The symptoms are often going to be the same, whether your device is infected with a trojan or any other type of malware:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Antivirus and Anti-Malware Tools Are Disabled: <\/strong>You might notice that your antivirus program is suddenly disabled or even uninstalled.<strong><\/strong><\/li><li><strong>High Latency and Load Speeds<\/strong><strong>:<\/strong> Your device suddenly becomes slow and sluggish. You may notice warning messages about your device lacking sufficient memory to complete tasks or run programs.<\/li><li><strong>Freezing Screen<\/strong><strong>:<\/strong> You might even experience your screen freezing up completely or getting the dreaded \u201cblue screen of death.\u201d<\/li><li><strong>Unusual Cursor Movements:<\/strong> The mouse cursor starts acting up. This may involve moving automatically, moves in the different directions or at inconsistent speeds. In some cases, you might not be able to move or control it at all. Sometimes, the cursor disappears, and you can still notice some activities on your screen such as programs or browsers automatically open up (as if someone is operating your device from a remote place)<\/li><li><strong>Unsolicited Pop-ups<\/strong><strong>:<\/strong> You start seeing unwanted pop-ups on your screen. This includes everything from frequent virus and software update alerts to advertisements and messages telling you to download unknown software programs.<\/li><li><strong>Automatic Website Opening:<\/strong> As soon as you connect to the internet or open a browser, some unknown websites open automatically in your browser. In some cases, you may be redirected to some unknown spammy website while surfing online.<\/li><li><strong>Unknown Extensions Appear In Your Browser<\/strong><strong>: <\/strong>You will find some unknown extensions installed in your web browser. To check the extensions you have installed in your browsers, type <strong>chrome:\/\/extensions\/<\/strong> in Chrome\u2019s address bar or <strong>about:addons<\/strong> in Firefox\u2019s address bar. For Internet Explorer, go to the main menu and click on <strong>Manage Add-ons<\/strong>.<\/li><li><strong>Unknown Programs in Task Manager:<\/strong> If you open your task manager window (which you can do by pressing Ctrl+Alt+Delete), you will notice some unknown programs and apps running.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Your Device from Trojan Horses<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1) Beware of Phishing Emails<\/h3>\n\n\n\n<p>Attackers commonly use phishing email to distribute their trojan horse malware. To avoid accidentally downloading or installing a trojan:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Educate yourself and your employees to recognize a phishing email. Check out these two easy-to-follow articles: <a href=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/\">How to know if an email is fake<\/a> and <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing email scams<\/a>.<\/li><li>Don\u2019t download an email attachment from unknown senders. Furthermore, always be sure to scan all email attachments with anti-malware software (even from senders you know) before downloading anything.<\/li><li>Hover over your cursor to the links given in the email to know where it actually redirects to. You can also right-click on the links and hit <strong>Inspect<\/strong>. The link you will see after <strong>&lt;a href=\u201d <\/strong>is the webpage where the given link will bring you to.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2) Regularly Scan Your Devices with Anti-Malware Software<\/h3>\n\n\n\n<p>Security software and firewalls can detect and remove the majority of trojan malware. They can also alert you when you visit a spammy or malicious website, or if you download a corrupted file from the internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3) Be Careful When Downloading Anything from Internet<\/h3>\n\n\n\n<p>By now, you already know that trojan horses mimic legitimate software to lure users into downloading them. Hence why you must be extra vigilant in downloading anything from the internet. Scan everything that you download from the internet.&nbsp;<\/p>\n\n\n\n<p><strong>Apps:<\/strong> Beware of installing unknown apps. When you search for an app and see many other apps with a little variation in names, do an internet search to find the official name of the app you want to install.<\/p>\n\n\n\n<p>Let\u2019s say you want to install Zoom for conference calls. You might come across apps like Zoon-online, ZoomMeeting, GetZoom, Zoom Calling, Zoom Video Calling, etc. However, you\u2019re not sure which of these is legitimate. To figure out which one actually belongs to the Zoom platform, visit the app\u2019s official website and check the app publisher\u2019s name in the app store before installing it on your device.<\/p>\n\n\n\n<p><strong>Software<\/strong>: If you\u2019re downloading software, check out the publisher&#8217;s name in the security window and conduct a quick search about the publisher and read the reviews. If you see the publisher&#8217;s name as <strong>Unknown<\/strong>, avoid installing that software. When the software publisher&#8217;s name is written as <strong>Unknown<\/strong>, it indicates that they are not using a <a href=\"https:\/\/sectigostore.com\/page\/code-signing-certificates-price-feature-comparison\/\">code signing certificate<\/a>. Hence, such software shouldn\u2019t automatically be trusted in terms of their integrity and authenticity.<\/p>\n\n\n\n<p>Legitimate devs and publishers use code signing certificates to protect their software from being tampered with. The certificate authority (CA) who issues the certificate conducts a rigorous vetting process to verify the software publisher\u2019s identity and issue the certificate only to a legit publisher. &nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1007\" height=\"434\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/code-signing-warning-message.png\" alt=\"Two screenshots showing Windows SmartScreen messages for unsigned software and signed software by a verified publisher. \" class=\"wp-image-1324 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/code-signing-warning-message.png 1007w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/code-signing-warning-message-300x129.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/code-signing-warning-message-560x241.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/code-signing-warning-message-940x405.png 940w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">4) Always Store Backups on Third-Party Cloud Platforms:<\/h3>\n\n\n\n<p>Always store your backups on a third-party cloud platform such as Google Drive, Dropbox, etc. This will help you to recover your data in the event of a crash or a cyber attack. If a trojan corrupts, encrypts, or removes your data, you can restore everything if you have a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-incremental-backup\/\">current data backup<\/a> available. Backups are the best solution for the ransomware attacks. Always scan the files with anti-malware software before uploading them to the backup folder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5) Keep Your Systems Patched and Up to Date<\/h3>\n\n\n\n<p>The best protection against many types of malware, including the vulnerability finding trojan, is to keep your operating system and all the software patched. Updates are not only for tweaking the appearance and functionality of the software. The publishers fix the security vulnerabilities in the old versions and publish the patched version. The hackers develop malware that can exploit the vulnerabilities of the old version. Hence why it\u2019s always important to install the updated version of the operating system, software, and apps as soon as they are available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping Up on Answering \u201cWhat Is a Trojan Horse?\u201d<\/h2>\n\n\n\n<p>A trojan horse can\u2019t get into your system until you manually download it. So, be vigilant whenever you download anything from the internet. Whenever you find any software, program, application, free stuff, or advertisements online that look too good to be true, follow your instincts, and refrain from downloading them.<\/p>\n\n\n\n<p>If you receive an unsolicited communication for some type of benefit (lottery winning, grand prize, free products, etc.), ask yourself why you\u2019re selected. How many people do you know who are making millions just by playing some online games or casino? If you get a notice that you must use some software (like a flash player or any media player) to access content, do a quick search about that software and read the customer reviews. Also, even if it is a well-known software or browser extension, install them from their official website only instead of clicking on link given in the pop-ups.<\/p>\n\n\n\n<p>We hope this article has helped you to answer questions like \u201cwhat is a trojan horse?\u201d and how to protect your device from this type of threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore what trojan horses are \u2014 their invasion techniques, the most common types, the damage they cause, and how can you protect your device &amp; organization from trojan attacks Ever&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1330,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[22,104],"class_list":["post-1319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-malware","tag-trojan-horse","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is a Trojan Horse in Computer Terms? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"A trojan horse in computer terms refers to malicious software. Here&#039;s everything to know about what trojans mean &amp; how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Trojan Horse in Computer Terms? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"A trojan horse in computer terms refers to malicious software. Here&#039;s everything to know about what trojans mean &amp; how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-17T10:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-12T11:51:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"What Is a Trojan Horse in Computer Terms?\",\"datePublished\":\"2020-08-17T10:37:00+00:00\",\"dateModified\":\"2021-01-12T11:51:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/\"},\"wordCount\":2971,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/trojan-horse-feature-1.jpg\",\"keywords\":[\"malware\",\"trojan horse\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/\",\"name\":\"What Is a Trojan Horse in Computer Terms? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/trojan-horse-feature-1.jpg\",\"datePublished\":\"2020-08-17T10:37:00+00:00\",\"dateModified\":\"2021-01-12T11:51:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"A trojan horse in computer terms refers to malicious software. Here's everything to know about what trojans mean & how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/trojan-horse-feature-1.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/trojan-horse-feature-1.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"what is a trojan horse feature image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-trojan-horse-in-computer-terms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a Trojan Horse in Computer Terms?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Trojan Horse in Computer Terms? - InfoSec Insights","description":"A trojan horse in computer terms refers to malicious software. Here's everything to know about what trojans mean & how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/","og_locale":"en_US","og_type":"article","og_title":"What Is a Trojan Horse in Computer Terms? - InfoSec Insights","og_description":"A trojan horse in computer terms refers to malicious software. Here's everything to know about what trojans mean & how to protect yourself.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/","og_site_name":"InfoSec Insights","article_published_time":"2020-08-17T10:37:00+00:00","article_modified_time":"2021-01-12T11:51:17+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"What Is a Trojan Horse in Computer Terms?","datePublished":"2020-08-17T10:37:00+00:00","dateModified":"2021-01-12T11:51:17+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/"},"wordCount":2971,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg","keywords":["malware","trojan horse"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/","url":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/","name":"What Is a Trojan Horse in Computer Terms? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg","datePublished":"2020-08-17T10:37:00+00:00","dateModified":"2021-01-12T11:51:17+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"A trojan horse in computer terms refers to malicious software. Here's everything to know about what trojans mean & how to protect yourself.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/trojan-horse-feature-1.jpg","width":1600,"height":1000,"caption":"what is a trojan horse feature image"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is a Trojan Horse in Computer Terms?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1319"}],"version-history":[{"count":9,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions"}],"predecessor-version":[{"id":2214,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions\/2214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1330"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}