{"id":5280,"date":"2018-09-25T18:09:22","date_gmt":"2018-09-25T12:39:22","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5280"},"modified":"2020-09-21T13:37:17","modified_gmt":"2020-09-21T08:07:17","slug":"what-is-trojan-horse","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/","title":{"rendered":"What is Trojan Virus? How they work and methods to be protected?"},"content":{"rendered":"<div>\n<img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg\" alt=\"Trojan Horse\" \/><\/p>\n<\/div>\n<p>Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim\u2019s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the background without the users \u2018 knowledge. Then the installed <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">trojan horse virus<\/a> create a backdoor for the cyber-criminals to spy on the activities and the confidential data involved and takes control of the complete system.<\/p>\n<p>Trojans help the attackers to<\/p>\n<ul>\n<li>Alter the existing data<\/li>\n<li>Block any data<\/li>\n<li>Delete data<\/li>\n<li>Copy data<\/li>\n<li>Distort the system performance or the complete computer networks<\/li>\n<\/ul>\n<p>There are different types of Trojans that are developed to perform attacks that includes<\/p>\n<p><strong>Backdoor<\/strong>&#8211; The malware authors take control of the victim\u2019s system from <a href=\"https:\/\/remoteaccess.itarian.com\" target=\"_blank\" title=\"Remote Access\">remote<\/a>. It enables the malware author to send, receive, delete or launch, show up data and reboot the computer. It is deployed by hackers to attack a group of target computers that form of a botnet that is further used for creating a security breach.<\/p>\n<p><strong>Exploit<\/strong> \u2013 These programs identifies the vulnerability in an application or software in the target system and exploits it to attack the system.<\/p>\n<p><strong>Rootkit<\/strong> \u2013 These are malicious programs developed by malware authors to disguise or hide certain activities of the system. The main objective of the malware is to escape detection, by this way the malicious programs can stay and perform its malicious activities on the infected computer.<\/p>\n<p><strong>Trojan Banker<\/strong> \u2013 This is developed to take control of the victim\u2019s account data through online banking systems, credit cards, debit cards or e-payment systems.<\/p>\n<p><strong>Trojan DDOS<\/strong> \u2013 These are malicious programs that perform Denial of Service Attacks against a targeted website. The malware sends continuous requests from the user\u2019s computer and other infected systems that can strongly affect the target address which furthers causes Denial of Service.<\/p>\n<p><strong>Trojan Ransom<\/strong> &#8211; This is yet another type of Trojan that can alter the data on the victim\u2019s system and locks the user\u2019s files so that the user can no longer access the files. The malware author then demands a ransom to unlock or decrypt the locked files.<\/p>\n<p><strong>Trojan Spy<\/strong> \u2013 These are malicious programs that infects the system to track data through keystrokes, screenshots or getting access to all the running applications.<\/p>\n<p><strong>Trojan Mailfinder<\/strong> \u2013 This type of malicious programs extracts all the email address from the victim\u2019s system.<\/p>\n<p>There are many more that includes Trojan-SMS, Trojan-IM, Trojan-GameThief, Trojan-FakeAV, Trojan-Dropper and Trojan-Downloader<\/p>\n<p>Cyber criminals are finding new ways and techniques to attack the victims\u2019 device through Trojans. Therefore installing an efficient <a href=\"https:\/\/enterprise.comodo.com\/security-solutions\/endpoint-protection\/\" target=\"_blank\" + title=\"What is Endpoint Protection\">endpoint protection software<\/a> is important. Comodo has been one of the best market players in the industry as it includes some of the robust features like firewall, <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">antivius software<\/a>, host Intrusion Prevention, containment technology and Default Deny Protection, anti-spyware, etc all in one single platform. The Containment Technology generates an isolated virtual environment where the unknown files are run and executed while the other operations of the computer are not affected.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">Best Antivirus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"_blank\" rel=\"noopener\">Antivirus for Android<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">Virus Protection<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim\u2019s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the background without the users \u2018 knowledge. Then the installed trojan horse virus create a backdoor [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[209,235],"class_list":["post-5280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-trojan","tag-trojan-horse"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Trojan Horse? | Types of Trojan Viruses Explained<\/title>\n<meta name=\"description\" content=\"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Trojan Horse? | Types of Trojan Viruses Explained\" \/>\n<meta property=\"og:description\" content=\"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-25T12:39:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-21T08:07:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"216\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/\",\"name\":\"What is Trojan Horse? | Types of Trojan Viruses Explained\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg\",\"datePublished\":\"2018-09-25T12:39:22+00:00\",\"dateModified\":\"2020-09-21T08:07:17+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg\",\"width\":300,\"height\":216,\"caption\":\"trojan horse virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Trojan Virus? How they work and methods to be protected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Trojan Horse? | Types of Trojan Viruses Explained","description":"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/","og_locale":"en_US","og_type":"article","og_title":"What is Trojan Horse? | Types of Trojan Viruses Explained","og_description":"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-09-25T12:39:22+00:00","article_modified_time":"2020-09-21T08:07:17+00:00","og_image":[{"width":300,"height":216,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/","name":"What is Trojan Horse? | Types of Trojan Viruses Explained","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg","datePublished":"2018-09-25T12:39:22+00:00","dateModified":"2020-09-21T08:07:17+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Get to know what is a trojan horse and their types. This virus disguises as a genuine software to gain access to a victim\u2019s system using rootkit method.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse-300x2161.jpg","width":300,"height":216,"caption":"trojan horse virus"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Trojan Virus? How they work and methods to be protected?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5280"}],"version-history":[{"count":16,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5280\/revisions"}],"predecessor-version":[{"id":15474,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5280\/revisions\/15474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/230"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}