What is Trojan Horse malware?

Trojan horse (or “Trojan”) is a broad term describing malicious software that uses a disguise to hide its true purpose. However, unlike a virus, it is neither able to replicate nor infect files on its own. To infiltrate a victim’s device, this malware category relies on other means, such as drive-by-downloads, exploitation of vulnerabilities, download by other malicious code, or social engineering techniques.

What is a Trojan horse virus?

Similar to the Trojan Horse known from ancient Greco-Roman tales, a Trojan horse virus hides its true function, often disguising itself as legitimate software, in order to gain unauthorised access to a device. After reaching the targeted machine, it often employs various techniques to be executed by the user or by other software on the affected system.

Trojan horses are currently the most common type of malware, used to open backdoors, take control of the affected device, exfiltrate user data and send it to the attacker, download and run other malicious software on the affected system as well as for many other nefarious goals.

Examples of trojan horse malware, and how they work

Think you’re safe from being tricked by a Trojan horse? It’s surprisingly easy to get fooled by them. You could simply receive a message that looks like it's from a friend or someone in your family. It could be an email or text, or even a message from their social media account – one that you trust. There’s a link in there to an attachment and you download it.

You’ve opened that file, and it’s installed malware onto your device. It’ll execute and spread to its target files and start damaging your computer or stealing your data. Every Trojan is different, but it’s safe to assume that all Trojans will do something bad to your device.

Types of Trojan Malware

Unfortunately for everyone, Trojan malware doesn’t just come in one form. There are a number of common types of Trojan malware and a few you may be less familiar with. We’re going to run you through a number of these so you can be prepared.

Backdoor Trojans are exactly as their name describes. They open up a way for attackers to access your device, otherwise known as a ‘backdoor’. Once they’ve done this, your attackers can do what they like, whether it’s downloading data or uploading more malware.

When you’ve been infected, this Trojan concentrates on downloading new malware or updating other malware that may already be installed.

It looks like real antivirus software and talks like real antivirus software… up to a point. Fake antivirus Trojans will demand money to ‘scan’ and ‘remove’ supposed threats which may not even exist.

This form of Trojan malware will specifically target your instant messaging and social accounts. It will go after your logins and passwords.

Once downloaded, these Trojans are designed to perform DDoS attacks on your network. Essentially, they’ll bombard your network with traffic until it can’t cope.

Specifically targeting gamers, especially online ones, a game-thief Trojan is designed to steal their account details, whether it’s log-ins or your payment and personal details.

A Trojan that’s been developed to steal your address book. It’ll worm its way through your device, whether it’s a desktop, tablet or mobile and target your contacts. Stealing their email addresses.

This is a Trojan that doubles up as ransomware. It will hold your device, or a particular folder, to ransom, demanding money for access. It won’t always provide it if you pay up either.

Designed with one purpose and one purpose only; this Trojan is here for your data, and it’s going to steal it.

Designed to target mobile devices, an SMS Trojan will target your inbox. It can send and intercept messages, often having been specifically designed to send a number of texts to premium numbers.

Accessing your device remotely is often an end goal of many attackers, and this Trojan does exactly that. Once the cybercriminals are in, they have full control of your machine, so can easily steal data, spy on you, access the accounts you’re logged into or install more malware.

A rootkit is often part of a wider attack. The goal is to obscure or completely hide something on your device. That means this type of Trojan can hide an infection from you while the malware gets to work.

While these types of Trojans technically steal all of your login details for your online accounts, their main goal is to obtain your financial account information: whether that’s banking access, credit card details, bills and more.

How to recognise and detect a Trojan horse on your computer

Many Trojan horse viruses exploit vulnerabilities in victims’ systems in order to infiltrate them. To mitigate these vulnerabilities, a combination of good cyber-hygiene and use of a reliable security solution is recommended.

Users should also be aware of regular updates, not only their operating system but all the software they use.

How to remove Trojan Horses from your computer?

You can detect and remove threats for free using our easy-to-use online scanner. The one-time scan is quick and easy, can be used without installation and is a great way to identify vulnerabilities and remove these in the short term.

This scanner will carry out the following steps to remove a Trojan from your device:

  • Perform a scan
  • Isolate the infected file
  • Remove the infected file

It’s that simple, but you do need to make sure you are checking for these attacks regularly. If you think one may have slipped through your existing digital protection, try an online malware scanner.

ESET offers you an award-winning antivirus

ESET HOME Security Premium

Powerful, multilayered protection to encrypt sensitive data, manage passwords easily, secure online transactions and more. A user-friendly solution for enhanced privacy online. Secures Windows, macOS, Android, and iOS devices.

 

Ultimate digital security for business

Protect your company endpoints, business data and users with ESET's
multilayered technology.

Ultimate digital security for business

Protect your company endpoints, business data and users with ESET's multilayered technology.