Definition of Trojan Horse, Where the Term ‘Trojan Horse’ Come From? Common Categories of Trojans Malware

What is Trojan Horse

What is Trojan Horse?

A Trojan horse or Trojans is a type of malware that disguises itself as a useful application or hides behind a legitimate application and gets downloaded along with it. Once the application is executed, the Trojan malware executes itself and starts the attack. This creates a backdoor in device security that allows attackers to gain access to the device. Most ransomware attacks use Trojan horses to create a backdoor.


Where the term ‘Trojan Horse’ come from?

This is probably one of the most interesting stories in ancient Greek history.

During the Trojan War, the Greeks wanted to end the war and destroy the city of Troy. But after 10 years of countless desperate attempts, they failed miserably. But he didn't give up. They made a plan. Master carpenter Epirus built an 80-foot-tall wooden horse. Greek soldiers pretended to be away and left the horse as a gift or a symbol of peace offering. Fall into the foolish Trojan trap. He pulled the horse into the city as a trophy of victory.  But the clever Greeks hid their 40 warriors inside a huge horse. At night the warriors came out and opened the door for the Greek army. The Greeks entered the city and destroyed it.


In Computing: The phenomenon is also mentioned in Homer's 'Odyssey. Metaphorically, a 'Trojan horse' is a trick that makes you reluctantly welcome your enemy into a secure protected area. A 'Trojan horse' in computing is a malicious computer program that tricks users into reluctantly running it. It attracts us and damages our computer system.


Common Categories of Trojans Malware

There are several types of Trojans that can be classified on the basis of the action they perform on the computer system. The most common types are:

1. Exploit Trojans

2. Banker Trojans

3. Downloader Trojans

4. DDoS Trojans

5. Backdoor Trojans

6. Rootkit Trojans


1. Exploit Trojans

Exploit Trojans can inject some malicious code into corrupted machines to take full advantage of the weakness of software applications running on compromised systems.


2. Banker Trojans

Banker Trojan Horse programmed in such a way to steal all confidential banking details of users like credit card details, net banking passwords, etc.


3. Downloader Trojans 

Downloader Trojans are written to download or install some updated version of malicious additional programs on infected systems.


4. DDoS (Distributed Denial of Service) Trojans

DDoS is programmed to carry out DDoS attacks against targeted websites. The main purpose is to slow down the network by bombarding the infected computer system with heavy traffic.


5. Backdoor Trojans 

Backdoor Trojans allow cyber crooks to create backdoors on affected systems to gain access and even complete control over that computer system. It does not allow the user to send, delete, receive any files or download any useful programs to the infected system.


6. Rootkit Trojans 

Rootkit Trojan Horse is specially developed to detect such malicious programs in the victim system in order to prolong its survival and cause maximum damage.


Without wasting time, you need to install reliable anti-malware programs and highly advanced firewall protection settings in your computer system if you do not want to fall prey to the Trojan malware threat.

Leave a Reply

Also Read

Join GraspHack Family!

We will never spam you.

Be a part of our ever growing community.