The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These functions allow unauthorized access to the host computer, giving them the ability to save their files on the user’s computer or even watch the user’s screen and control the computer.
Trojan horses (not technically a virus) can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. The term is derived from the classical story of the Trojan horse.
How Can You Detect Trojans? Check for Trojans with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Trojans as well as a one-on-one tech support service.Download SpyHunter's Malware Scanner to Detect Trojans*
Free SpyHunter Remover Details & Terms
There are currently 4,540 articles listed on trojans.
|Name||Threat Level||Detection Count||Date|
|Downloader-CJX.gen.a||5/10||0||July 26, 2010|
|Downloader.Blugger||March 4, 2011|
|Downloader.Fostrem||8/10||0||July 16, 2009|
|Downloader.Generic_c.AHI||July 16, 2009|
|Downloader.Generic10.BDJ||9/10||4||December 15, 2014|
|Downloader.Instas||9/10||0||June 15, 2012|
|Downloader.Jadelile||9/10||3||May 23, 2012|
|Downloader.Lofog!gen2||February 2, 2011|
|Downloader.Malscript||1/10||5,651||July 27, 2011|
|Downloader.Monkif||8/10||0||February 2, 2011|
|Downloader.Parshell||9/10||0||July 20, 2012|
|Downloader.Puzby||7/10||0||January 8, 2013|
|Downloader.Sninfs.B||August 24, 2009|
|Downloader.Win32.Agent.cvbx||September 30, 2010|
|Downloader.Win32.Agent.dt||September 20, 2011|
|Downloader.Win32.Delf.cgx||April 1, 2010|
|Downloader.Wowick||July 28, 2009|
|Dragon Trojan||November 8, 2010|
|Dridex||8/10||3||October 29, 2014|
|DropDrans||9/10||1||February 4, 2015|
|Dropper-FDH||7/10||0||March 22, 2013|
|Dropper.MsPMs||9/10||0||August 27, 2012|
|Dropper.Win32.Dapato.pj!1a||9/10||0||June 28, 2012|
|Dropper/Xema.22016.AI||6/10||53||March 19, 2010|
|Dropper/Xema.22528.AK||December 7, 2009|