gptkbp:instanceOf
|
malware
|
gptkbp:alsoKnownAs
|
Trojan
|
gptkbp:canBeBypassedBy
|
gptkb:security
firewalls
|
gptkbp:canBeDeployedOn
|
malware
|
gptkbp:canCreate
|
backdoor
|
gptkbp:canSteal
|
banking information
passwords
|
gptkbp:category
|
computer security
cybercrime
information security
|
gptkbp:detects
|
gptkb:security
network monitoring
behavioral analysis
|
gptkbp:distinctFrom
|
gptkb:virus
malware
|
gptkbp:distributedBy
|
instant messaging
peer-to-peer networks
email attachments
malicious websites
software downloads
removable media
|
gptkbp:doesNotSelfReplicate
|
true
|
gptkbp:firstDescribed
|
1970s
|
https://www.w3.org/2000/01/rdf-schema#label
|
Trojan horse (computing)
|
gptkbp:infects
|
disguised as legitimate software
social engineering
|
gptkbp:namedAfter
|
gptkb:Trojan_Horse_(mythology)
|
gptkbp:notableExample
|
gptkb:Emotet
gptkb:Back_Orifice
gptkb:Remote_Access_Trojan_(RAT)
gptkb:SpyEye
gptkb:Zeus_Trojan
|
gptkbp:platforms
|
gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
|
gptkbp:prevention
|
do not open suspicious attachments
keep software updated
use antivirus software
avoid untrusted downloads
|
gptkbp:purpose
|
deceive users
gain unauthorized access
install additional malware
steal information
|
gptkbp:relatedTo
|
gptkb:keyboard
malware
phishing
botnet
rootkit
|
gptkbp:removes
|
gptkb:security
malware removal tools
|
gptkbp:bfsParent
|
gptkb:Trojan_Horse_(mythology)
|
gptkbp:bfsLayer
|
6
|