Trojan horse (computing) | trojan worm
TypeofmalwareIncomputing,aTrojanhorseisanymalwarethatmisleadsusersofitstrueintent.ThetermisderivedfromtheAncientGreekstoryofthedeceptiveTrojanHorsethatledtothefallofthecityofTroy.[1][2][3][4][5]Trojansgenerallyspreadbysomeformofsocialengineering;forexample,whereauserisdupedintoexecutinganemailattachmentdisguisedtoappearinnocuous(e.g.,aroutineformtobefilledin),orbyclickingonsomefakeadvertisementonsocialmediaoranywhereelse.Althoughtheirpayloadcanbeanything,manymodernformsactasabackdoor,contact...
Type of malware
In computing, a Trojan horse is any malware that misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.[1][2][3][4][5]
Trojans generally spread by some form of social engineering; for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer.[6]Ransomware attacks are often carried out using a trojan.
Unlike computer viruses, worms, and rogue security software, trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.[7]
Use of the term[edit]Its not clear where or when the conce...