Trojan.MacOS.Downloader.Z
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 6,287 |
First Seen: | November 24, 2020 |
Last Seen: | September 18, 2023 |
Trojan.MacOS.Downloader.Z is a generic detection of a downloader component of a trojan infection. Downloaders are the components of threats which are designed to download the payload or additional components.
Trojan is short for trojan horse and the term is derived from an ancient greek myth. Threats that are designated as trojans can serve many purposes but have one thing in common. The feature that defines trojans is stealth. Trojans aim to infiltrate a system and carry out their functions without the knowledge of the victim. For that purpose, trojans are often included as hidden or hard-to-find components of freeware bundles. In other cases, trojans can sneak in disguised as fake updates, most commonly Adobe Flash Player updates.
Once a trojan has infected a system, there are numerous tasks it can perform. Trojans often serve as intermediary infections, meaning they infect a device to facilitate the download and installation of other more sophisticated threats. Another common use for trojans is data collection and exfiltration. The information a trojan can gather may vary from threat to threat. Cybercriminals often go after banking credentials or credentials for other accounts which can ensure further points of entry.
Developers of security solutions strive to stay on top of new definitions for all threats including trojans. This allows the timely detection of new threats as new trojans and other malware are developed daily.