Trojans

The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These functions allow unauthorized access to the host computer, giving them the ability to save their files on the user’s computer or even watch the user’s screen and control the computer.

Trojan horses (not technically a virus) can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. The term is derived from the classical story of the Trojan horse.

How Can You Detect Trojans? Check for Trojans with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Trojans as well as a one-on-one tech support service.

Download SpyHunter's Malware Scanner to Detect Trojans*
Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

There are currently 4,540 articles listed on trojans.

Name Threat Level Detection Count Date
Backdoor.Win32.Agent.bcvw December 27, 2010
Backdoor.Win32.Bifrose.fsi December 27, 2010
Backdoor.Win32.Clampi.a October 29, 2009
Backdoor.Win32.Fynloski March 22, 2011
Backdoor.Win32.NewRest.bc October 20, 2009
Backdoor.Win32.Poison.bizd March 18, 2010
Backdoor.Win32.ProRat.iwv December 15, 2010
Backdoor.Win32.SubSeven.19 November 2, 2009
Backdoor.Wisdoor.EV 8/10 62 May 11, 2010
BackSwap Banking Trojan May 29, 2018
Bagoox 8/10 0 October 19, 2015
Banker.Fox.A May 11, 2009
Banker.MSIL.MultiPhishing.gen 9/10 0 February 14, 2012
Banload Trojan August 26, 2011
Bartalex 9/10 4 July 23, 2015
BDS/Andromeda.EB.6 8/10 0 November 22, 2012
BDS/Zaccess.W 9/10 0 August 20, 2012
BDS/ZeroAccess.Gen 10/10 7 September 26, 2012
Bedep 6/10 3,198 February 20, 2015
Beebone 8/10 0 February 13, 2013
Beendoor April 22, 2019
Bholog.B Trojan 8/10 4 July 27, 2015
Bicololo June 10, 2013
BIOLOAD December 30, 2019
Bitcoin Collector Scam May 28, 2019
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 182

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9

Home
Registered Office: 1 Castle Street, 3rd Floor, Dublin 2 D02XD82 Ireland.
EnigmaSoft Limited, Private Company Limited by shares, Company Registration Number 597114.

Copyright 2016-2020. EnigmaSoft Ltd. All Rights Reserved.

Mac and MacOS are trademarks of Apple Inc., registered in the U.S. and other countries.