Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

Trojan Horse

A Trojan horse (or simply Trojan) is a type of malware that misleads users as to its true intent by disguising itself as a legitimate or benign program. Named after the ancient Greek myth of the wooden horse used to infiltrate Troy, a Trojan deceives users into downloading or executing it, after which it performs malicious activities on the infected system.

Unlike computer viruses or worms, Trojans do not self-replicate. Instead, they rely on social engineering tactics and user interaction for distribution. Users may be tricked into executing an email attachment disguised as a routine document or form, or into clicking a fake advertisement or download link.

Once installed, Trojans can perform a wide range of malicious activities, including

Providing unauthorized remote access (backdoors) for cybercriminals

Capturing keystrokes to steal passwords and sensitive information (keyloggers)

Taking screenshots and recording video or audio from webcams and microphones

Stealing financial data, banking credentials, or personal information

Installing additional malware on the infected system

Enrolling the device in a botnet for distributed attacks

Trojans account for approximately 51.45% of all malware incidents, making them the most prevalent form of malicious software. Common delivery methods include malicious email attachments, infected software downloads, fake software updates, and compromised websites.

Protection against Trojans includes keeping software updated, using reputable antivirus tools, avoiding suspicious email attachments or downloads, and implementing email security solutions like those provided by Pangratis to block malicious messages before they reach users.

Ransomware starts with a single email

Block malicious payloads before they reach your users — before any damage is done.

Block ransomware delivery