Trojan Horse (computing)

GPTKB entity

Statements (49)
Predicate Object
gptkbp:instanceOf gptkb:malware
gptkbp:alsoKnownAs gptkb:Trojan
gptkbp:category gptkb:cybercrime
computer security
malicious software
gptkbp:commonPayloads gptkb:keyboard
gptkb:malware
backdoor
gptkbp:detects gptkb:security
behavior analysis
gptkbp:differenceFromVirus does not self-replicate
gptkbp:differenceFromWorm does not spread automatically
gptkbp:distributedBy social engineering
malicious website
email attachment
software download
gptkbp:doesNotSelfReplicate true
gptkbp:effect data theft
system compromise
financial loss
privacy breach
gptkbp:example gptkb:Dridex
gptkb:Emotet
gptkb:Remote_Access_Trojan_(RAT)
gptkb:Zeus_Trojan
gptkbp:firstDescribed 1970s
gptkbp:namedAfter gptkb:Trojan_Horse_(mythology)
gptkbp:prevention user education
do not open suspicious attachments
enable firewalls
keep software updated
use antivirus software
gptkbp:purpose deceive users
gain unauthorized access
install additional malware
steal information
gptkbp:relatedConcept gptkb:malware
gptkb:rootkit
virus (computing)
worm (computing)
gptkbp:removes gptkb:security
manual removal
gptkbp:requiresUserAction true
gptkbp:target gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
https://www.w3.org/2000/01/rdf-schema#label Trojan Horse (computing)