Trojan horse (computing)

GPTKB entity

Statements (55)
Predicate Object
gptkbp:instanceOf malware
gptkbp:alsoKnownAs Trojan
gptkbp:canBeBypassedBy gptkb:security
firewalls
gptkbp:canBeDeployedOn malware
gptkbp:canCreate backdoor
gptkbp:canSteal banking information
passwords
gptkbp:category computer security
cybercrime
information security
gptkbp:detects gptkb:security
network monitoring
behavioral analysis
gptkbp:distinctFrom gptkb:virus
malware
gptkbp:distributedBy instant messaging
peer-to-peer networks
email attachments
malicious websites
software downloads
removable media
gptkbp:doesNotSelfReplicate true
gptkbp:firstDescribed 1970s
https://www.w3.org/2000/01/rdf-schema#label Trojan horse (computing)
gptkbp:infects disguised as legitimate software
social engineering
gptkbp:namedAfter gptkb:Trojan_Horse_(mythology)
gptkbp:notableExample gptkb:Emotet
gptkb:Back_Orifice
gptkb:Remote_Access_Trojan_(RAT)
gptkb:SpyEye
gptkb:Zeus_Trojan
gptkbp:platforms gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
gptkbp:prevention do not open suspicious attachments
keep software updated
use antivirus software
avoid untrusted downloads
gptkbp:purpose deceive users
gain unauthorized access
install additional malware
steal information
gptkbp:relatedTo gptkb:keyboard
malware
phishing
botnet
rootkit
gptkbp:removes gptkb:security
malware removal tools
gptkbp:bfsParent gptkb:Trojan_Horse_(mythology)
gptkbp:bfsLayer 6