A Trojan Horse is a malware attack in which users are fooled into installing malicious code on a computing system. Named from the Trojan War story of Greek subterfuge, in many cases a trojan horse attack involves software, code, or links that claim to offer desired functionality to a user but that also carries hidden software that performs illicit activity once installed.¶Ransomware, which locks a workstation and its data until a ransom is paid, and remote access trojans (RATs), which hide in the background to enable a remote attacker to easily take control of a workstation over the Internet, are both forms of trojan horse software. Another common form may capture a user's keystrokes, including usernames, passwords, and account data, and send these to a third party.
Stay informed. Join our low-volume list for news and updates.