A diverse range of different malware are deployed against enterprises, educational institutions and even government departments in today’s threat landscape. However, perhaps one of the most insidious options available to modern cybercriminals is the Trojan, or Trojan Horse. Like it’s mythical ancient Greek namesake, this type of malware appears to be an innocent offering, but comes loaded with dangerous surprises.

In this blog, we’ll cover what Trojan malware is and explore some of the different types encountered by threat analysts that are currently in circulation.

Trojan malware in brief

A Trojan horse is a kind of malicious software or code that appears legitimate but has the power to assume control of a device. A Trojan is engineered for a variety of purposes. These include to disrupt, damage, steal, and in some cases just inflict harmful actions on a firm’s network or data.

Trojans acts like authentic applications and file to fool users. They seek to deceive potential victims into loading and then executing trojan malware onto their computer or phone. Once installed, Trojans can perform the malicious actions that they were designed for.

Backdoor Trojans

These Trojan have the capacity to create a “backdoor” on a victim’s device. It allows an attacker computer access, but also control. A user’s data can therefore be downloaded by an unauthorised individual and stolen. It also allows further types of software to be installed on a device.

DDoS (Distributed Denial of Service) attack Trojans

These Trojans are designed to conduct DDoS attacks. Their aim is to take down a computer network by bombarding it with traffic and user requests. Once enslaved by a DDoS Trojan, your infected computer is used to create traffic and crash the systems of others.

Downloader Trojans

This type of Trojan targets an already-infected device. It then downloads and loads brand-new versions of malicious software. This may include more Trojans, but also adware and spyware.

Bogus AV Trojans

These Trojans can perfectly emulate antivirus software, but demand payments from targets to identify and effectively remove threats, whether they are fake or real.

Infostealer Trojans

As the name suggests, the sole purpose of these Trojans is to steal sensitive data from infected computers.

Mail-finder Trojans

This type of Trojan Horse seeks to obtain all the email addresses that a user has accumulated on their device. Typically, this Trojan is deployed to support an email spoofing or malicious spam campaign.

Remote Access Trojans (RATs)

These Trojans provide attackers with total control over a device through a remote network connection. Their insidious uses include spying on users and stealing confidential information.

Ransom Trojans

These Trojans seek a ransom payment in return for undoing damage inflicted on a device. This may include blocking company data or simply impairing a computer’s performance.

Cybersecurity solutions for your organisation

At the heart of all the cybersecurity solutions we offer at Galaxkey is powerful three-layer encryption designed to keep the data you store and send safe from attack. Approved by the NCSC, our encryption solution is second-to-none. Contact us today to get a demo.