{"id":3913,"date":"2023-08-02T17:15:54","date_gmt":"2023-08-02T17:15:54","guid":{"rendered":"https:\/\/bristeeritech.com\/?p=3913"},"modified":"2023-08-02T17:39:18","modified_gmt":"2023-08-02T17:39:18","slug":"what-is-a-trojan-horse","status":"publish","type":"post","link":"https:\/\/bristeeritech.com\/it-security-blog\/what-is-a-trojan-horse\/","title":{"rendered":"What is a Trojan Horse?"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.21.0″ _module_preset=”default” use_background_color_gradient=”on” background_color_gradient_stops=”rgba(0,59,96,0.39) 0%|rgba(107,0,94,0.46) 100%” background_color_gradient_overlays_image=”on” background_image=”https:\/\/bristeeritech.com\/wp-content\/uploads\/2023\/04\/ai-002-1.jpg” background_position=”bottom_center” background_vertical_offset=”30%” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”15px||15px||true|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ text_font=”||||||||” header_font=”|||||on|||” header_text_align=”center” header_font_size=”50px” background_layout=”dark” max_width=”91%” module_alignment=”center” header_font_size_tablet=”” header_font_size_phone=”38px” header_font_size_last_edited=”on|phone” z_index_tablet=”500″ text_text_shadow_style=”preset2″ text_text_shadow_horizontal_length=”0.34em” text_text_shadow_vertical_length=”-0.12em” text_text_shadow_blur_strength=”0.58em” text_text_shadow_color=”#0C71C3″ global_colors_info=”{}”]<\/p>\n

What is a Trojan Horse?<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.20.4″ custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.20.2″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”||||true|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|desktop” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

Like the giant, hollow wooden horse used against the ancient city of Troy, Trojan Horse viruses sit harmlessly outside of your computer\u2019s walls until they are invited in. Disguised as useful applications or as attachments sent by a colleague, the malware deploys stealthily in the background once a user downloads and opens it. Afterwards, the trojan horse unloads its malicious payload and gives cyber criminals access to your computer system.<\/p>\n

This article will explore the type of malware known as Trojan Horses, examine how they get onto your computer, look at the damage they can cause, and offer advice on how to avoid them altogether and remove them if you\u2019re already infected<\/a>!<\/p>\n

[\/et_pb_text][et_pb_image src=”https:\/\/bristeeritech.com\/wp-content\/uploads\/2023\/08\/trojan-virus-malware-repair-removal-south-carolina.jpg” alt=”Depiction of a trojan virus with a red Knight horse from a chess board over binary code” title_text=”trojan-virus-malware-repair-removal-south-carolina” align=”center” _builder_version=”4.21.2″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” width_last_edited=”on|phone” width_phone=”100%” max_width=”100%” height_last_edited=”on|phone” sticky_enabled=”0″ height_phone=”152px”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”2px||2px||true|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

History of the Trojan Horse<\/h2>\n

Trojan Horses have a long history that dates back to the early days of the internet. However, their roots can be traced even further back to the inception of the computer age. After the mythological use of the Trojan Horse by the Achaean Greeks, the term \u2018Trojan Horse\u2019 has found use in a military context to describe a deceptive strategy used to infiltrate enemy lines. This concept was translated to the digital world, with the first instances of digital Trojans appearing in the 1970s. During this era, Trojans were mostly confined to research labs and were often regarded as more of a theoretical threat.<\/p>\n

The first widely recognized Trojan, known as the “PC-Write Trojan,” appeared in the late 1980s. The PC-Write Trojan masqueraded as a free version of a popular word processing software. Users, lured by the prospect of free software, unknowingly installed the trojan, which then performed malicious activities.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”15px||15px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

How Do Trojans Work?<\/h2>\n

While some types of computer viruses, like worms, actively try to infiltrate your computer, trojan horses rely on social engineering to gain access to your computer. The trojans disguise themselves as a legitimate program, a collection of photos from a friend, or a compressed folder from a coworker. Unwary computer users then download and execute the file.<\/p>\n

The file may or may not work correctly, but all the while in the background malicious code is at work. Once installed, a Trojan can help attackers perform various cybercrimes such as stealing sensitive information, creating a backdoor for hackers, or causing system damage.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=”on” _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”15px||15px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

Common Types of Trojan Malware<\/h2>\n

Trojans come in various forms, each with their own specific purpose and method of operation. Most commonly, Trojans are hybrids and use a combination of tactics to exploit your computer.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”8px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

Downloader Trojan<\/h3>\n

Downloader trojans are designed to download and install new versions of malicious programs onto the victim’s computer without their knowledge. This lets the initial program appear quite small, as the bulk of the payload is downloaded silently in the background.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.21.2″ use_background_color_gradient=”on” background_color_gradient_stops=”rgba(255,255,255,0.53) 0%|rgba(255,255,255,0.47) 100%” background_color_gradient_overlays_image=”on” background_image=”https:\/\/bristeeritech.com\/wp-content\/uploads\/2023\/07\/malware-virus-computer-cell-phone-repair-midlands-sc.jpg” background_size=”custom” background_image_width=”3%” background_image_height=”29%” background_position=”top_center” background_vertical_offset=”-3%” custom_padding=”2px||||false|false” background_last_edited=”on|desktop” background_enable_image_tablet=”off” background_image_width_tablet=”14%” background_image_height_tablet=”18%” background_vertical_offset_tablet=”-5%” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

Backdoor Trojan<\/h3>\n

Also known as remote access trojans, these create a “backdoor” into a user’s system, allowing the attacker unrestricted access to the compromised computer. Using the backdoor, attackers can delete or modify files, monitor keystrokes and record passwords, and install other malicious software as they desire.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.21.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”||19px||false|false” global_colors_info=”{}” column_structure=”3_5,2_5″][et_pb_column type=”3_5″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” custom_margin=”-31px|||0px|false|false” custom_padding=”|||0px|false|false” header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}”]<\/p>\n

Distributed Denial of Service (DDoS)<\/h3>\n

DDoS Trojans can take control of the infected system and use it to launch denial of service attacks<\/a> against other networks or websites. This type of Trojan is a subtype of \u2018botnet\u2019 and works by harnessing the collective power of thousands, tens of thousands, or even millions of infected devices.<\/p>\n

[\/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”4.21.2″ header_2_font_size=”30px” header_3_font_size=”26px” custom_margin=”|||0px|false|false” custom_padding=”|||0px|false|false” hover_enabled=”0″ header_2_font_size_tablet=”” header_2_font_size_phone=”27px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”” header_3_font_size_phone=”22px” header_3_font_size_last_edited=”on|phone” z_index_tablet=”500″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n

Game-thief Trojan<\/h3>\n

Game-thief Trojans are designed to steal account information for online games. Oftentimes this results in significant real-world financial losses<\/a>, as many games allow for in-game purchases using stored credit cards. The digital assets are then offloaded and re-sold on digital black markets.<\/p>\n

There are literally thousands of malicious files targeting big games like Roblox, Minecraft, PUBG, FIFA, and more. Oftentimes these trojans disguise themselves within programs designed to help users cheat or in pirated versions of game software<\/a>.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_code _builder_version=”4.21.2″ _module_preset=”default” text_orientation=”center” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]