Home / malwarePDF  

Trojan:W32/Trojan


First posted on 04 November 2009.
Source: SecurityHome

Aliases :

There are no other names known for Trojan:W32/Trojan.

Explanation :

A trojan, or trojan horse, is a seemingly legitimate program which secretly performs other, usually malicious, functions. It is usually user-initiated and does not replicate.

Additional DetailsThis is the Trojan General Information page.

Named after the Trojan Horse of Greek legend, a trojan is a malicious program that performs, or appears to perform, one function, but in reality executes another action without the user's knowledge or consent. Quite often, the trojan will either have or pretend to have a functionality that offers a useful service to the user - like a screensaver, a utility program, a service pack or application update and so on - in order to encourage the user to install the trojan.

Once the trojan is installed however, it performs its actual, unauthorized function, which ranges from mildly annoying pranks (like changing desktop icon positions), to serious, user-inhibiting functions (like disabling the keyboard or mouse) to critically destructive actions (like erasing files or stealing data).

The majority of trojans today carry a payload designed to cause harm.

Trojans can be further subdivided based on how they function once they are installed onto a system, or how they deliver their payload:

  • Trojan-Downloader   • Trojan-Dropper   • Trojan-Proxy   • Trojan-PSW   • Trojan-Spy

Last update 04 November 2009

 

TOP