Trojan horse is malicious software that disguises itself as legitimate software, tricking users into downloading it and then can perform malicious actions. It is usually embedded in games and spreads via social engineering methods like emails, software downloads, or infected websites, and they can be extremely difficult to detect and remove without specialized antivirus software.
4. TYPES OF TROJAN
TRICKS
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
Backdoor Trojans: Craft hidden entrances
for remote system control.
01
Downloader Trojans: Covertly fetch and install
more malware.
02
Destructive Trojans: Target files, causing
widespread damage and potential data loss.
03
Remote Access Trojans (RATs): Gift attackers
complete system control for data theft
and monitoring.
04
5. SPOTTING TROJAN
TRICKS SIGNS
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
Sluggish Showdown: Computer performance
is slowing unexpectedly.
01
Pop-Up Carnival: Strange ads and pop-ups
disrupting your digital ride.
02
Browser Carousel Spin: Homepage or search
engine changes without consent.
03
Software Sneak-Ins: Programs that you didn't
ask for appear on your computer.
04
7. DEFENDING YOUR
TROJAN CASTLE
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
Antivirus Shield: Install and update antivirus
software to thwart Trojan plans.
01
Attachment Vigilance: Open email attachments
cautiously; scan them before unveiling.
02
Webs of Caution: Stay away from suspicious
websites hosting Trojan traps.
03
Peer-to-Peer Pause: Avoid the malware
breeding grounds of peer-to-peer file sharing.
04