Skip to main content

What is a Trojan Horse? - Towards Cybersecurity

In this article, I am discussing what is Trojan Horse and its types. So, Let's begin.

A Trojan Horse is commonly known as a Trojan, is one of the most dangerous malware. Trojan Horse is a form of malicious software that represents itself as something useful or legitimate in order to trick users into installing it so it can carry out its malicious goals.

Its name comes from the tale of ancient Troy, with the Greeks hidden inside a giant wooden horse, which they claimed was a gift to the city of Troy. Once the horse was inside the city walls, a small team of Greeks emerged from inside the giant wooden horse and took the city. 

What is a Trojan Horse? - Towards Cybersecurity

Trojan Horse operates in much the same way, in that it moves into your system often disguised as a legitimate tool like an update or a Flash download then, Once it's on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. After that, a Trojan Horse can then potentially access and capture everything like system information, keystrokes, login and passwords, screenshots, banking details, and more and secretly send it all to the attackers. Sometimes a Trojan can even allow attackers to modify data or turn off anti-malware protection or install threats like viruses and ransomware.

A Trojan Horse depends on the user to download it (usually from the internet or via email attachment) and run it on the target. Trojans pretend itself as legitimate therefore users download them thinking they will get a useful piece of software and instead end up with a malware infected computer.

What is a Trojan Horse? - Towards Cybersecurity

Trojan Horses are classified based on how they infect the systems and the damage caused by them.

Types of Trojan Horses :-
  • Remote Access Trojans : Allows an attacker to take the remote access of your system without your knowledge.
  • Data Sending Trojans : Steals data saved on your system and transmits it over to the attacker.
  • Destructive Trojans : Destroys other files and services.
  • Security Software Disabler Trojans : Disabled system antivirus and firewall so that other malicious files can be downloaded and run without getting detected.
  • Proxy Trojans
  • FTP Trojans
  • Denial-of-Service attack Trojans

A Trojan Horse is not a virus. It is a destructive program that looks like a legitimate application. Unlike Viruses and Worms, Trojan Horses do not replicate themselves or reproduce through infection but they can be just as destructive.

I hope you find useful information in this article. If you have any questions related to a Trojan Horse and their types then please mention in the comments section and I will get back to you and stay tuned with my blog to learn interesting things related to cybersecurity and hacking. 

Comments

Popular posts from this blog

How To Check If a Link Is Safe To Click

Many times, we share links among our friends on social media platforms like WhatsApp, Facebook, Instagram or Twitter. But do we know how safe they are? What can happen if you click on any malicious link? We never think of the following things : Links can drop various harmful programs, viruses on your device Links can steal your personal data by dropping spyware or keyloggers Use your browser for crypto mining which will affect your device's performance Even if your device is secured with antivirus, not all of them warn you before clicking such malicious links . And the moment you click on these, they will become big trouble for you. This can sometimes even be dangerous with regard to data security and identity theft. So, Be careful about what you click on. These days one of the quickest growing security issues is ransomware , which is often spread by the user unintentionally clicking dangerous links in emails, social media platforms, messengers, and other tool

TikTok Secretly Sent Users Private Data & PII Number to Chinese Server Including Draft Videos

The popular Android and iOS short-videos creating app, TikTok hit with a lawsuit claims that the app illegally and secretly transfers app's users' private sensitive data and Personally Identifiable Information (PII) to Chinese servers. TikTok which is a 15-second short-video creating app especially popular among the younger generation and also downloaded over 1.3 Billion times worldwide . TikTok remains top in the most downloaded app list for months on the Apple App Store and Google Play Store.  According to the lawsuit, Tiktok shared the user's created videos which include private acts and closeups of user's faces (biometric data) before the videos are saved on the app. TikTok provides many options includes the next button, close button, and button for effects to its users while recording the video. Here, the next button takes users to the screen that shows these two options : "post" and "save".  After clicking on the "next" button, Tik

Facebook, Instagram and WhatsApp Down : Apps Crash For Users Worldwide Including In India

If you are facing problems with Facebook , Instagram , and WhatsApp on your device then you are not alone. Suddenly, the service of Facebook, Instagram, and WhatsApp's are facing technical problems since late evening on Wednesday. Users are facing these types of problems on Facebook :- While using Facebook, Users are facing problems in loading images, loading videos, and loading all other data across its apps while some users were unable to load photos on Facebook News Feed. On the Twitter platform, Facebook said that it is aware of the issue. Users are facing these types of problems on Instagram :- On Instagram (just like Facebook apps), the issues appear to be limited only to a certain part of the site. Many users report an issue to Instagram that their feed might not load, also it is not possible to post anything new (images, videos, stories) into it. If a user tries to post anything new (images, videos, stories) brings up an error indicat