Trojan horse (computing)
A Trojan horse can also be called a Trojan horse virus, but that is technically incorrect. Unlike a computer virus, a Trojan can not replicate itself, nor can it spread without the help of an end user. In computing, a Trojan, or Trojan, is any malware that deceives users about their true intention. The term is derived from the ancient Greek history of the deceptive wooden horse that led to the fall of the city of Troy.
Trojans are usually propagated through some kind of social engineering, for example, when a user is tricked into running an email attachment disguised to look suspicious (for example, a routine form that must be completed), or clicking on a fake ad on social networks or anywhere else. Although its payload can be anything, many modern forms act as a backdoor, contacting a controller who may have unauthorized access to the affected computer. Trojans can allow an attacker to access personal information of users, such as banking information, passwords or personal identity. You can also delete a user’s files or infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan horse.
This is the reason why attackers must use social engineering tactics to trick the end user into running the Trojan horse. Typically, malware programming is hidden in an innocent-looking email attachment or free download. When the user clicks on the attachment of the email or downloads the free program, the malware that is hidden inside is transferred to the user’s computer device. Once inside, the malicious code can execute any task that the attacker designed to carry out.
Because the user often does not know that a Trojan horse has been installed, the security of the computer device depends on the anti-malware software that can recognize the malicious code, isolate it and delete it. To avoid being infected by Trojan malware, users must keep their antivirus software updated and never click on links from unreliable sources or download files from unknown senders.