Trojan horse (computing)

In computing, a trojan horse (or simply trojan;[1] often capitalized,[2] but see below) is a kind of malware that misleads users as to its true intent by disguising itself as a normal program.

Trojans are generally spread by some form of social engineering. For example, a user may be duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or into clicking on a fake advertisement on the Internet. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected device.[3] Ransomware attacks are often carried out using a trojan.

Unlike computer viruses and worms, trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.[4]

  1. ^ Cite error: The named reference Collins2020 was invoked but never defined (see the help page).
  2. ^ Cite error: The named reference Gregg2015 was invoked but never defined (see the help page).
  3. ^ Cite error: The named reference Broadcom2013 was invoked but never defined (see the help page).
  4. ^ "VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00 (Question B3: What is a Trojan Horse?)". October 9, 1995. Archived from the original on August 5, 2020. Retrieved September 16, 2019.

From Wikipedia, the free encyclopedia · View on Wikipedia

Developed by Nelliwinne