Skip to content
crmnuggets
Menu
  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu

Follow Us On Social Media

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

Unknown Facts About Trojan Horses

Trojan Horses: How It Really Works (+Examples)

Posted on April 26, 2023March 3, 2025 by Adeniyi Salau

 

The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors.
At night, after most Trojans were asleep, the warriors burst out of the horse, opened the city gates, and allowed a sizeable force to enter and take over the city.
Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games.
Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
The Trojan horse concept is flexible. It can cause immediate damage, provide remote access to the system, or access through a back door. It can also perform actions as instructed remotely, such as “send me the password file once per week.” This tendency of malware to send data back to the cybercriminal highlights the need to monitor outbound traffic for attack indicators.
Custom-written Trojan horses, such as those with a specific target, are difficult to detect.
 

Trojan Horse Classification

this is the image’s alt text
DestroyEnable Remote AdministrationTransmit Password
Trojan horses are usually classified according to the damage that they cause, or the manner in which they breach a system, as shown in the figure.
Type of Trojan Horse Description
Remote-access Enables unauthorized remote access.
Data-sending Provides the threat actor with sensitive data, such as passwords.
Destructive Corrupts or deletes files.
Proxy Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.
FTP Enables unauthorized file transfer services on end devices.
Security software disabler Stops antivirus programs or firewalls from functioning.
Denial of Service (DoS) Slows or halts network activity.
Keylogger Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.
PEOPLE ALSO READ:  Insight Into Packet Forwarding Decision Process
Powered by Inline Related Posts
Action Point

PS: I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.

Fact Check Policy

CRMNuggets is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

 

Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too

 

 

OUR MISSION

To create well-reached contents that will increase the intellectual prowess of our readers. 

OUR VISION

To become a reference point in the blogging space by the year 2030. We want to be among the first 30 blogs in Nigeria. 

Official Social Media Pages for crmnuggets.com

To Get Email Updates when we post new contents, Click Here.

 Join Our Telegram Channel: CRMNUGGETSTwitter: @crmngr
​Facebook Group: @AdeniyiSalau

Facebook Page: CRMNuggets
Instagram: @crmnigeriablog
Pinterest: CRMNUGGETS

Threads@crmnuggets

Tiktok: CRMNUGGETS

Fact Check Policy
Contact Us

Sharing Is Caring. If you enjoy this article, help us share with others.
truehost

Related posts:

  1. Network Logs In Cybersecurity: Facts To Note
  2. Common Vulnerability Scoring System: Facts To Note
  3. Host Based Firewalls In Cybersecurity: The Facts
  4. Blogging As Part Of Online Marketing: What You Need To Know
PEOPLE ALSO READ:  Role Of Hacktivists In Network Security Threats
Powered by Inline Related Posts

Post navigation

← Ways Of Generating Leads Through Influencers (+Examples)
Initial SQL Slammer Infection: How It Is Done →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CHECK THIS

You may also like

  1. Network Logs In Cybersecurity: Facts To Note
  2. Common Vulnerability Scoring System: Facts To Note
  3. Host Based Firewalls In Cybersecurity: The Facts
  4. Blogging As Part Of Online Marketing: What You Need To Know
© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme