Are You Sure You’re NOT Infected with Malware?
Don’t Fall Victim to Malware or Ransomware Attacks!
Detect and remove malware, viruses, ransomware & other threats for FREE! Get Protected with SpyHunter.
Download SpyHunter (FREE Trial!)*The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These functions allow unauthorized access to the host computer, giving them the ability to save their files on the user’s computer or even watch the user’s screen and control the computer.
Trojan horses (not technically a virus) can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. The term is derived from the classical story of the Trojan horse.
A computer Trojan is full of trickery like the mythological Trojan horse in which it was fashioned and named after. According to Greek mythology, it would be an illusory act of kindness that would bring about the destruction of Troy, ending a 10-year siege. Thinking the wooden Trojan Horse abandoned outside its city’s wall a gift, the people of Troy brought about ‘their own demise’ by inviting or pulling it inside their fortified gates. Surprisingly, the Trojan Horse was hollow and full of malice, Greek warriors who awaited an appointed and vulnerable time to attack.
Computer Trojans use a similar blend of simple and complex strategies to unleash an attack:
Trojans are well trained warriors and can inflict a lot of damage in a small amount of time and the longer they are allowed to fester undetected, the greater the damage and risk. They usually work quietly in the background while the victim works and is none the wiser their system has been infiltrated.
The Internet security community classifies malware by their ghastly deeds or malicious intent. As mentioned earlier, Trojans can be charged one or more payloads and therefore, can be multi-skilled or talented. Below are a few techniques a Trojan may display:
A well built Trojan program can reconfigure a system and make changes comparable to that of an expert programmer and may arrange the following defense mechanisms:
Trojans don’t always work alone; sometimes they solicit the help of another malicious program or tool:
Basically, Trojans are the greatest cons or chameleons known to the digital world and may come in the form of:
Malware is often cloaked inside the legitimate download of freeware or shareware and hidden behind adware courtesy of some ambiguous end-user license agreement (EULA). Other traps where Trojans are cleverly hidden or placed include:
Trojans have become landmines waiting to explode into something sinister in hopes of achieving the evil mission of its malware creator. Some security reports indicate computer Trojans as accounting for 83% of malware attacks around the world. It is no surprise that reports contribute to this increase to human behavior, since many PC users have not properly secured their systems and too remain quick to click on dubious links that explode into something malicious.
Gone are the days when viruses, including Trojans, only annoyed its victims, i.e. PC users, by pulling silly pranks, i.e. change the desktop screen, add or delete icons, freeze the keyboard, etc. Trojans are viral warheads and not only can cripple your finances by stealing vital data, but too can destroy files or use your computer to harm others.
# | Threat Name |
Severity Level
Severity Level: The determined severity level of an object, represented
numerically, based on our risk modeling process and research, as explained in our
Threat Assessment Criteria.
|
Alias(es) |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|---|
1. | Trojan:Win64/Mikey.GTZ!MTB | |||
2. | Backdoor.Glupzy.A | 80 % (High) |
W32/Heuristic-114!Eldorado TR/Disabler.I.15 Trojan.Win32.Packed.gen (v) |
13 |
3. | Trojan.Adject | 80 % (High) | 3,648 | |
4. | Trojan.JS.Agent.bvy | 90 % (High) | ||
5. | TROJ_RODECAP.SM | 90 % (High) | 10,079 | |
6. | Win32/Agent.UZD | 90 % (High) | 4 | |
7. | Trojan.TinyNuke | 80 % (High) | 32 | |
8. | Magala | 90 % (High) | 30 | |
9. | Spammer.Tedroo.J | 80 % (High) |
Malicious Software Trojan-Proxy.Small.MP W32/Small.MP!tr |
|
10. | Trojan.Win32.Agent.fyny | |||
11. | Trojan.Lapka | 80 % (High) | 1 | |
12. | Kankan | 90 % (High) | 211 | |
13. | Artemis!0914D934EF1D | 90 % (High) | ||
14. | Azoralt Trojan | |||
15. | TrojanDownloader:O97M/Donoff | 90 % (High) | 113 | |
16. | Trojan.WinLNK.Runner.bl | 80 % (High) | 17,326 | |
17. | Trojan.Inject.t | 90 % (High) | 601 | |
18. | Tone.exe | |||
19. | StrongPity | |||
20. | Behavior:Win32/AgeDown.SA | |||
21. | Trojan.Small.of | 90 % (High) |
Trojan.Adclicker Mal/Heuri-E Generic.Malware |
10 |
22. | Win-Trojan/KillAv.3102944 | |||
23. | Trojan-Dropper.Win32.Delf.gzg | |||
24. | 1999 Trojan | 90 % (High) | 33 | |
25. | Trojan.Mebromi.A | 90 % (High) | 4 | |
26. | TrojanSpy:Win32/Banker.AJC | 80 % (High) | 13 | |
27. | Trojan horse Startpage.TOW | 90 % (High) | 45 | |
28. | Troj/Agent-AANA | 80 % (High) | 1 | |
29. | Win32/Spy.Ranbyus.I | 90 % (High) | 2 | |
30. | Doki Trojan |
Last updated: 2024-12-05