Trojan Horses: What They Are and How to Avoid Them

A Trojan horse, or Trojan for short, is a piece of malware that pretends to be something benign, such a media player, an emailed file, a smartphone app or even a Web page. Users are deceived into opening the file, which in most cases installs the malware.

A Trojan can masquerade as almost any sort of file. Image files, office documents, sound files or online games are some other common examples.

MORE: 5 Free PC Security Programs Worth Downloading

There are two main differences between Trojans and viruses or worms. Trojans can't replicate themselves or spread independently, as both viruses and worms do, and they are always created with malicious intent, while viruses and worms are sometimes benign or accidental.

What Trojans do

A Trojan horse can be written to do almost anything on your computer, and is typically set up to run every time your computer is restarted. It can create a remote backdoor to your system, allowing a cybercriminal to control your computer. It runs silently and secretly, often evading or even disabling anti-virus software.

Some Trojans install keyloggers or other forms of spyware, which record keyboard activity, monitor Internet usage and sometimes collect personal information. Other Trojans install botnet software, which enrolls a computer in a "zombie army" of computers linked together and secretly controlled by cybercriminals without the owners' knowledge.

Botnets are used for many purposes, including launching distributed denial-of-service (DDoS) attacks to jam websites, pumping out spam emails, cracking encrypted passwords or storing stolen credit-card numbers.

Many Trojans are installed via "drive-by downloads," in which hackers subtly change an unsuspected Web page's code so that visiting browsers automatically download malware. If the user account that unknowingly downloads the Trojan has permission to modify software, the Trojan often will automatically install itself.

Mobile Trojans are often found in third-party app stores, where they pretend to be cheaper versions of popular smartphone apps. Android users need to examine the permissions each app demands before it's installed; iPhone and iPad users are probably safe as long as they don't "jailbreak" their devices.

Once Trojans are installed, detecting them can be difficult. The best method is to use a "packet sniffer" that analyzes network traffic for signs of communication with cybercriminal-controlled servers. However, most good anti-virus software will block the installation of known Trojans.

How to prevent infection by Trojans

As with other forms of malware, a few simple steps can greatly reduce your chances of infection by Trojans.

First, structure the user-accounts permissions on your computer so that accounts with full administrative rights are used rarely, and only to install or update software. For all other tasks, including Internet use and regular office work, use limited accounts that cannot modify applications.

Second, turn on whatever firewalls are available on your home network. Windows 7, Vista and the latest version of XP have built-in firewall options, as does Mac OS X. So will your wireless router.

Third, install a robust anti-virus software product, make sure you keep it constantly updated, and set it up to regularly perform automatic system scans. Many free anti-virus products are available from several vendors, including Microsoft, but the paid ones do a better job of protecting Web browsers and email clients from drive-by downloads and Trojanized attachments.

Follow us @tomsguide, on Facebook and on Google+.

TOPICS
Tom's Guide Staff

Tom's Guide upgrades your life by helping you decide what products to buy, finding the best deals and showing you how to get the most out of them and solving problems as they arise. Tom's Guide is here to help you accomplish your goals, find great products without the hassle, get the best deals, discover things others don’t want you to know and save time when problems arise. Visit the About Tom's Guide page for more information and to find out how we test products.

Latest in Malware & Adware
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Latest in How To
An image of an iPhone screen showing the Safari app icon in the center
I got tired of Safari revealing my web searches in iOS 18.4 — this setting fixes that
Gmail logo on iPhone
I used Google Gemini to declutter my Gmail account — here's how you can do it too
An Amazon Echo speaker with ChatGPT logo next to it
I replaced Alexa with ChatGPT on my Amazon Echo — here's how you can do it too
AirPods Pro 2 in hand
Your earbuds are disgusting — here's the right way to clean them
ChatGPT logo on a smartphone screen being held outside
7 biggest ChatGPT mistakes — and how to fix them
a photo of a woman looking at her fitness tracker
Forget the treadmill — I boosted my metabolism and walked 2,000 steps with this 15-minute workout