This type of trojan allows unauthorized parties to use the infected computer as a proxy server to access the Internet anonymously.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
When searching our Virus Descriptions database for a specific program (e.g., Trojan-Proxy:W32/Example.A), you may be directed to this page if the overview below sufficiently describes the program.
Alternatively, you may be directed to this page if no description matching that specific query is currently available. You can submit a sample of the suspect file to our Response Lab for further analysis via:
A Trojan-Proxy is a type of trojan that, once installed, allows an attacker to use the infected computer as a proxy to connect to the Internet.
Trojan-Proxies are often used by hackers to hide the location of the original host from any investigating authorities, as the connection can only be traced back to the computer where the trojan is installed.
For more information, see Terminology: Trojan.