Trojan Horse (computing)

GPTKB entity

Statements (51)
Predicate Object
gptkbp:instanceOf malware
gptkbp:alsoKnownAs Trojan
gptkbp:category computer security
cybercrime
malicious software
gptkbp:commonPayloads gptkb:keyboard
malware
backdoor
gptkbp:detects gptkb:security
behavior analysis
gptkbp:differenceFromVirus does not self-replicate
gptkbp:differenceFromWorm does not spread automatically
gptkbp:distributedBy social engineering
malicious website
email attachment
software download
gptkbp:doesNotSelfReplicate true
gptkbp:effect data theft
system compromise
financial loss
privacy breach
gptkbp:example gptkb:Dridex
gptkb:Emotet
gptkb:Remote_Access_Trojan_(RAT)
gptkb:Zeus_Trojan
gptkbp:firstDescribed 1970s
https://www.w3.org/2000/01/rdf-schema#label Trojan Horse (computing)
gptkbp:namedAfter gptkb:Trojan_Horse_(mythology)
gptkbp:prevention user education
do not open suspicious attachments
enable firewalls
keep software updated
use antivirus software
gptkbp:purpose deceive users
gain unauthorized access
install additional malware
steal information
gptkbp:relatedConcept malware
rootkit
virus (computing)
worm (computing)
gptkbp:removes gptkb:security
manual removal
gptkbp:requiresUserAction true
gptkbp:target gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
gptkbp:bfsParent gptkb:Trojan
gptkbp:bfsLayer 5