Skip to main content

Guide

What is a Trojan? How to stay protected against the Trojan horse virus

F-Secure

5 min read

What is a Trojan horse?

A Trojan horse is a type of malicious software, also known as malware, that disguises itself as a useful, safe, or entertaining soft­ware to trick you into installing it. Once it’s on your computer, this malicious soft­ware secretly allows hackers to steal sensitive data, spy on your activities, or gain unauthorized access to your system.

Stay safe against the Trojan horse virus

Stay safe against the Trojan horse virus

Get protected against virus and malware with F‑Secure.

The Trojan virus is named after an ancient Greek story in which the Greeks couldn’t capture the great city of Troy even after years of war. To achieve their goal, they came up with a plan: to disguise a wooden horse large enough for 40 men to hide in as a gift to the Trojans.

Once the Trojans dragged the horse inside the city walls, the 40 men inside let in a greater force, and the city was captured. A Trojan computer virus works just like the famous Trojan horse of Greek legend; it disguises itself as some­thing else to get past your defenses undetected.

How does a Trojan horse virus work?

There are many ways for Trojans to infect your devices. A Trojan infection typically follows these steps:

  1. Deception. The Trojan virus appears to be a legitimate and relevant soft­ware, app, game, or update for your device. In reality, the soft­ware contains harmful code that will damage your device.

  2. User action. Once the user clicks on the legitimate-looking soft­ware or runs the update, the Trojan can infect the device and start running malicious tasks in the back­ground.

  3. Malicious action. When activated, the Trojan horse can steal data, gain unauthorized access, damage files, encrypt your files for ransom, activate key­loggers and create “back­doors” for further damage.

The Trojan virus relies on users clicking or running the malicious program on the infected device. Unlike different viruses and computer worms, a Trojan cannot spread automatically without a host activating it.

How does a device get infected by a Trojan virus?

Cyber criminals are well aware that a file named virus.exe won’t fool anyone. There­fore, the malicious file or soft­ware has to be disguised. A computer Trojan can be disguised as practically any­thing that gets your attention, such as an email attachment claiming to be an invoice, a viral cat video or an interesting app.

Trojans are often injected into a program or a file you want to down­load. Unfortunately, these tricks can be really difficult to spot. They are, after all, meant to fool you. Common ways of infecting a victim’s computer with a Trojan horse virus include phishing and so‑called drive-by down­loads where the Trojan is sneaked into the device.

An infograph of how a Trojan gets on a user’s device and what malicious tasks it can do.

5 common types of Trojans

There are different types of Trojan horses to look out for, and more sophisticated ones can perform multiple functions. Here are a few common types of Trojan malware:

1. Backdoor Trojan

As the name suggests, a back­door Trojan creates a back­door or gate­way to enter your device. When a back­door Trojan has established a path into your computer or mobile device, cyber criminals can use it to enter, steal your information, or infect the device with other malware and spy­ware.

2. Banking Trojan

A banking Trojan aims to steal your banking information, such as your bank account login details or credit card information. The victim of a banking Trojan may receive a malicious link in a phishing email, and after clicking it, the user is taken to a page that appears to be their bank’s login page. Instead of logging in to their online bank, they unknowingly provide their bank account details to cyber criminals.

3. Distributed Denial of Service (DDoS) Trojan

DDoS means that a server is bombarded with requests, causing its traffic to exceed its capacity. The word “distributed” here refers to multiple sources simultaneously attacking the server. A Trojan horse virus can connect a user’s infected computer or mobile device to a larger net­work of devices called a botnet and use the device to carry out DDoS attacks.

4. Downloader Trojan

Once active on your computer, the down­loader Trojan can secretly down­load and install other malicious programs, such as ransom­ware, spy­ware, or banking trojans. A down­loader Trojan is similar to a Trojan dropper, but droppers already contain the harmful program, whereas a down­loader Trojan does not.

5. Instant messaging (IM) Trojan

Trojans can also target instant messaging services such as Messenger to steal users’ login data and pass­words. Stay protected against instant messaging Trojans by using strong and unique pass­words and storing them in a pass­word manager.

Stay safe against the Trojan horse virus

Stay safe against the Trojan horse virus

Get protected against virus and malware with F‑Secure.

How to avoid Trojans and other online threats?

The Trojan horse virus cannot infect your device unless you let it in. There­fore, being safe requires your action. Follow these tips to protect your­self against Trojan malware:

  • Use antivirus software. A comprehensive anti­virus soft­ware actively scans your computer to detect, block, and remove malicious programs, including Trojans, before they can cause harm.

  • Avoid opening links and attachments. Be cautious with unexpected emails, as clicking on suspicious links and attachments is the most common way to get infected by a Trojan.

  • Download software only from legitimate sources. Avoid down­loading apps, soft­ware or files from unofficial web­sites or third-party app stores.

  • Don’t fall for phishing scams. Phishing messages create a false sense of urgency, often trying to trick you into down­loading an “important” document that is actually a Trojan virus.

Frequently asked questions about Trojan viruses

A Trojan horse virus tricks you into running it by pretending to be a legitimate program or file. Once activated on the user’s computer, it secretly performs harmful actions, such as stealing your pass­words, copying your sensitive data, or giving a malicious actor remote control over your computer.

F‑Secure SAFE is now called Internet Security. The easiest way to renew your subscription is by logging in to My F‑Secure.

After logging in, click the Renew now button in the upper right corner and continue to checkout. Your subscription is renewed based on your original subscription (license period and number of devices).

If you would like to increase the number of devices in your subscription, first renew your subscription, then click Buy more in your My F‑Secure account to purchase more licenses.

To protect additional devices, log in to My F‑Secure with your account user­name and pass­word. Select Add device and follow the instructions on the screen. You can find more detailed step-by-step instructions in the F‑Secure online help.

The Computer Misuse Act of 1990 makes it illegal in the United Kingdom to access or alter computer systems or data without permission. This means that it is illegal to use, create, or distribute Trojan viruses in the UK.

To remove a Trojan virus, disconnect your device from the internet and run a scan with a trusted anti­virus program, such as F‑Secure Internet Security. Follow the program’s instructions to detect and remove the Trojan. Delete all infected files and update your operating system and software from the official app store to prevent further infections.

Once activated, Trojans can run silently in the back­ground of your device and be difficult to detect. To detect a Trojan virus, run a full computer scan with a trusted anti­virus program, such as F‑Secure Internet Security or F‑Secure Total, that can detect malware.

Protect your devices from Trojans with F‑Secure Total

Trojan horse removal is harder than Trojan horse prevention, making reliable anti­virus and cyber security software invaluable. F‑Secure Total makes this easy, helping you to secure your devices in a brilliantly simple way.

  • Award-winning antivirus and malware protection

  • Online browsing, banking, and shopping protection

  • 24/7 online identity and data breach monitoring

  • Unlimited VPN service to safeguard your privacy

  • Password manager with private data protection