Trojan Horse Classification
|Type of Trojan Horse
|Enables unauthorized remote access.
|Provides the threat actor with sensitive data, such as passwords.
|Corrupts or deletes files.
|Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.
|Enables unauthorized file transfer services on end devices.
|Security software disabler
|Stops antivirus programs or firewalls from functioning.
|Denial of Service (DoS)
|Slows or halts network activity.
|Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.