{"id":6996,"date":"2019-03-08T18:17:12","date_gmt":"2019-03-08T12:47:12","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=6996"},"modified":"2020-08-18T19:00:01","modified_gmt":"2020-08-18T13:30:01","slug":"trojan-horse-attack","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/","title":{"rendered":"What is a Trojan Horse and How it Affects Your PC"},"content":{"rendered":"<p>A Trojan horse is a kind of malware that is concealed to look more like an authorized software. Hackers create trojan codes to establish a connection to the victim\u2019s system and gain illegal access to data without the user\u2019s consent. Most often hackers trick the victim users through social media engineering practices to install and run Trojans in the infected system.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/trojan-attacks.png\" alt=\"Trojan Horse Attacks\" width=\"650\" height=\"300\" class=\"aligncenter size-full wp-image-7031\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/trojan-attacks.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/trojan-attacks-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/03\/trojan-attacks-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><br \/>\nThe hackers, therefore create a backdoor entry to gain remote access from malicious system to the infected system. By this way, the cyber-thieves can spy on the activities of the victim\u2019s system and reach out to user\u2019s sensitive data.\u00a0 With Trojans, hackers can delete, alter, block, and copy data. <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">Trojan horse virus<\/a> can also allow the hackers to interfere with the system performance causing disruption and Blue Screen of Deaths. However, Trojans are not meant to self-replicate like viruses and computer worms.<\/p>\n<h2>Modus Operandi of Trojan Horses<\/h2>\n<p>Trojans are malicious codes that are developed and installed by the hacker onto the vulnerable applications, programs or files. Once the Trojans are installed, they intend to infect the other files associated with the victim\u2019s system. The malware author is also capable of gathering important sensitive information from the infected system and manages to take control over the complete functioning of the system causing system crash.<\/p>\n<p>Malware authors find ways to convince users to download the Trojan mostly through phishing mails. Once the program is executed, the Trojan server gets installed and starts to run instantly as and when the system power is turned on.<\/p>\n<h2>Different Types of Trojan Horses<\/h2>\n<p>The Trojans are categorized into different types as per the action involved in targeting and infecting the victim.<\/p>\n<ul>\n<li><strong>Rootkit: <\/strong>These types of Trojan horses are developed to hide the system activities in your system. The key objective of rootkits is to escape detection by the users and therefore enable a longer period of stay and cause more infection on the target system.<\/li>\n<li><strong>Backdoor Trojan:\u00a0<\/strong>This type of Trojan creates a backdoor to the victim computer to establish connection with system hosting the malware. This empowers the hacker to take control of the victim\u2019s system from remote and monitor the activities involved in the system. It also helps to download sensitive data by any third-party programs and can cause data or identity theft.<\/li>\n<li><strong>DDoS attack Trojan: <\/strong>This type of Trojan can do DDoS attacks also called Distributed Denial of Service Attacks. This type of attack floods the network with a heavy flow of unwanted and suspicious traffic that comes from an infected system.\u00a0<strong><br \/>\n<\/strong><\/li>\n<li><strong>Downloader Trojan:\u00a0<\/strong>This type of trojan downloads the malware content into a system that has been already infected.<\/li>\n<li><strong>Fake Antivirus Trojan:<\/strong> Malware authors design and develop this type of trojan to function more like an <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a>. However, it requests the user to pay a sum of money to remove the identified threats.<\/li>\n<li><strong>Ransom Trojan:<\/strong> This type of Trojan is created to steal or encrypt files and deny the user to access the encrypted files as well. The malicious author demands a huge payment to be made by the user to decrypt and render back the stolen files.<\/li>\n<li><strong>Infostealer Trojan:<\/strong> This is designed and developed to extract all the data from your infected system.<\/li>\n<li><strong>Remote Access Trojan:<\/strong> This is a type of Trojan used by hackers to take control of the victim\u2019s computer from remote. It is more commonly used to spy on the target users\u2019 activities.<\/li>\n<li><strong>Mailfinder Trojan:<\/strong> This type of trojan infects the system and searches to find email addresses that have been archived on the device.<\/li>\n<li><strong>Trojan banker:<\/strong> The key objective of this type of trojan is to steal bank-related documents like account balance statements, latest transactions and all the records related to target users\u2019 bank accounts.<\/li>\n<\/ul>\n<h3>Prevail with Prevention<\/h3>\n<p><strong>Implement best security practices to prevent any kind of Trojan attacks<\/strong><\/br><\/p>\n<ul>\n<li>Ensure that the operating system software is up-to-date; as outdated software is vulnerable to security attacks. It is also critical to ensure that the other software installed in the system are up-to-date with the latest patch fixes released by the software vendors.<\/li>\n<li>Ensure to implement scheduled scans on a regular basis to check if there are traces of malware infection. Automate the scanning process at defined regular intervals.<\/li>\n<li>Install an effective <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/free-internet-security.php\" target=\"_blank\" rel=\"noopener\">security suite<\/a> system like <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" rel=\"noopener\" target=\"_blank\">Comodo Antivirus<\/a> that combines the best security features like Default Deny protection, auto sandboxing technology, tailor-made protection, cloud-based antivirus, spyware scanning, cloud-based whitelisting and more customized alerts.<\/li>\n<li>Incorporate the use of unique and complex passwords.<\/li>\n<li>Be wary of suspicious email attachments. Ensure to scan the email attachments first, before opening the attachment.<\/li>\n<\/ul>\n<p><\/br><\/p>\n<h3><strong>How to stay safe from Trojans<\/strong><\/h3>\n<p>Install an effective antivirus software such as Comodo Antivirus to deliver instant protection to laptops, Macs, tablets, smartphones and PCs from Trojan-based attacks. Comodo Antivirus products are available to secure Windows devices, Android Mobiles, Linux devices and iOS devices. For more information on Comodo <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"_blank\">Android Antivirus<\/a>, visit our official page.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resource<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">Virus Protection<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Trojan horse is a kind of malware that is concealed to look more like an authorized software. Hackers create trojan codes to establish a connection to the victim\u2019s system and gain illegal access to data without the user\u2019s consent. Most often hackers trick the victim users through social media engineering practices to install and [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[9,209,235,249],"class_list":["post-6996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus","tag-trojan","tag-trojan-horse","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trojan Attacks | How Does Trojan Horse Infect Devices?<\/title>\n<meta name=\"description\" content=\"Trojan horse is a type of malicious software designed to spy on the victim&#039;s computer, or to gain access to files or to even extract sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trojan Attacks | How Does Trojan Horse Infect Devices?\" \/>\n<meta property=\"og:description\" content=\"Trojan horse is a type of malicious software designed to spy on the victim&#039;s computer, or to gain access to files or to even extract sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T12:47:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T13:30:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/\",\"name\":\"Trojan Attacks | How Does Trojan Horse Infect Devices?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg\",\"datePublished\":\"2019-03-08T12:47:12+00:00\",\"dateModified\":\"2020-08-18T13:30:01+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Trojan horse is a type of malicious software designed to spy on the victim's computer, or to gain access to files or to even extract sensitive data.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg\",\"width\":400,\"height\":288},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Trojan Horse and How it Affects Your PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojan Attacks | How Does Trojan Horse Infect Devices?","description":"Trojan horse is a type of malicious software designed to spy on the victim's computer, or to gain access to files or to even extract sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/","og_locale":"en_US","og_type":"article","og_title":"Trojan Attacks | How Does Trojan Horse Infect Devices?","og_description":"Trojan horse is a type of malicious software designed to spy on the victim's computer, or to gain access to files or to even extract sensitive data.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-03-08T12:47:12+00:00","article_modified_time":"2020-08-18T13:30:01+00:00","og_image":[{"width":400,"height":288,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/","name":"Trojan Attacks | How Does Trojan Horse Infect Devices?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg","datePublished":"2019-03-08T12:47:12+00:00","dateModified":"2020-08-18T13:30:01+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Trojan horse is a type of malicious software designed to spy on the victim's computer, or to gain access to files or to even extract sensitive data.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/Trojan-Horse.jpg","width":400,"height":288},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/trojan-horse-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Trojan Horse and How it Affects Your PC"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=6996"}],"version-history":[{"count":26,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6996\/revisions"}],"predecessor-version":[{"id":7011,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6996\/revisions\/7011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=6996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=6996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=6996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}