Trojan horse (computing)

Trojan horsetrojanTrojan horsestrojansTrojan downloaderComputer TrojaninfectedTrojan Horse programTrojan horse softwareTrojan software
In computing, a Trojan horse, or Trojan, is any malware which misleads users of its true intent.wikipedia
377 Related Articles

Malware

malicious softwaremalicious codemalicious
In computing, a Trojan horse, or Trojan, is any malware which misleads users of its true intent.
A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.

Trojan Horse

wooden horseTrojan horsesThe Trojan Horse
The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
A malicious computer program that tricks users into willingly running it is also called a "Trojan horse" or simply a "Trojan".

Ransomware

cryptotrojanRansomware (malware)Bad Rabbit ransomware attack - 2017
Ransomware attacks are often carried out using a Trojan.
Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment.

Backdoor (computing)

backdoorbackdoorsback door
Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.
Trojan horses can be used to create vulnerabilities in a device.

Computer virus

virusvirusescomputer viruses
Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
"Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, spyware, adware, trojan horses, keyloggers, rootkits, bootkits, malicious Browser Helper Object (BHOs), and other malicious software.

Sub7

Sub SevenSubSeven
Several versions of Sub7 have been widely circulated in the US and Europe and became the most widely distributed examples of this type of Trojan.
Sub7, or SubSeven or Sub7Server, is a Trojan horse program.

Spyware

anti-spywareantispywareSpyware removal software
In German-speaking countries, spyware used or made by the government is sometimes called govware.
Spyware is mostly classified into four types: adware, system monitors, tracking cookies, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons.

MiniPanzer and MegaPanzer

ERS SolutionsMegaPanzer
Examples of govware Trojans include the Swiss MiniPanzer and MegaPanzer and the German "state trojan" nicknamed R2D2.
MiniPanzer and MegaPanzer are two variants of Bundestrojaner (German for federal Trojan horse) written for ERA IT Solutions (a Swiss federal government contractor) by software engineer Ruben Unteregger, and later used by the Federal Department of Environment, Transport, Energy and Communications (UVEK) to intercept Skype and more generally voice over IP traffic on Windows XP systems.

EGABTR

EGABTR (EGA for enhanced graphics adapter), sometimes pronounced "Eggbeater", was a Trojan horse program that achieved some level of notoriety in the late 1980s and early 1990s.

Email

e-mailelectronic maile-mails
Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an email attachment disguised to appear not suspicious, (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else.
Attached files may contain trojans or viruses.

Bifrost (Trojan horse)

BifrostBifrost Trojan
Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 10 (although on modern Windows systems, after Windows XP, its functionality is limited).

Beast (Trojan horse)

BeastBeast Trojan
Beast is a Windows-based backdoor trojan horse, more commonly known in the hacking community as a Remote Administration Tool or a "RAT".

Gh0st RAT

Gh0st
Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into many sensitive computer networks.

Magic Lantern (software)

Magic LanternAntivirus vendor cooperation (Intentional nondetection)
It has been variously described as a virus and a Trojan horse.

Zeus (malware)

ZeusZeus TrojanZeus (Trojan horse)
Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows.

Twelve Tricks

Twelve Tricks is a trojan horse that first appeared around 1990.

Flashback (Trojan)

Trojan BackDoor.FlashbackFlashbackFakeflash
OSX.FlashBack, also known as the Flashback Trojan, Fakeflash, or Trojan BackDoor.Flashback, is a Trojan horse affecting personal computer systems running Mac OS X.

ZeroAccess botnet

ZeroAccess
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems.

Computer worm

wormswormComputer worms
Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.

Chaos Computer Club

CCCR2D2 (trojan)Bundestrojaner
Examples of govware Trojans include the Swiss MiniPanzer and MegaPanzer and the German "state trojan" nicknamed R2D2.
The Staatstrojaner (Federal Trojan horse) is a computer surveillance program installed secretly on a suspect's computer, which the German police uses to wiretap Internet telephony.

Vundo

The Vundo Trojan (commonly known as Vundo, Virtumonde or Virtumondo, and sometimes referred to as MS Juan) is either a Trojan horse or a computer worm that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook.

Back Orifice

As the server can be installed without user interaction, it can be distributed as payload of a Trojan horse.

FinFisher

FinSpyGammaFinFireWire
According to announcements from ESET, FinFisher and FinSpy are detected by ESET antivirus software as "Win32/Belesak.D" trojan.

Coreflood

Coreflood is a trojan horse and botnet created by a group of Russian hackers and released in 2010.