Trojan
Developer(s) | Various |
---|---|
Repository |
|
Written in | Various |
Engine | |
Operating system | Cross-platform |
Type | Malware |
License | Proprietary |
A Trojan horse, or simply Trojan, is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
Overview[edit | edit source]
The term "Trojan horse" is derived from the ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. In computing, a Trojan horse is a malicious program that misleads users of its true intent. Unlike computer viruses and worms, Trojans do not replicate themselves but can be just as destructive.
Functionality[edit | edit source]
Trojans are designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. They can:
- Provide a backdoor for unauthorized access to the infected computer.
- Steal sensitive data such as passwords, credit card information, and personal identity details.
- Install additional malware, such as ransomware or spyware.
- Use the infected computer to launch denial-of-service attacks.
Types of Trojans[edit | edit source]
There are several types of Trojans, each with its own purpose:
- Backdoor Trojans: These create a backdoor on your system for malicious users to access and control your computer.
- Downloader Trojans: These download and install new versions of malicious programs onto your computer.
- Infostealer Trojans: These are designed to steal information from the infected computer.
- Remote Access Trojans (RATs): These provide the attacker with full control over the infected computer.
Detection and Prevention[edit | edit source]
Detecting Trojans can be challenging, as they are often designed to avoid detection by antivirus software. However, there are several strategies to prevent Trojan infections:
- Use reputable antivirus software: Ensure it is updated regularly to detect the latest threats.
- Be cautious with email attachments: Do not open attachments from unknown sources.
- Download software from trusted sources: Avoid downloading software from unverified websites.
- Keep your operating system and software updated: Regular updates can patch vulnerabilities that Trojans exploit.
History[edit | edit source]
The concept of a Trojan horse in computing dates back to the early days of the internet. One of the first known Trojans was the AIDS Trojan, also known as the "PC Cyborg Trojan," which was distributed on floppy disks in 1989.
Also see[edit | edit source]
Search WikiMD
Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD
WikiMD's Wellness Encyclopedia |
Let Food Be Thy Medicine Medicine Thy Food - Hippocrates |
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian
Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.
Contributors: Prab R. Tumpati, MD