Cybersecurity Glossary

What Is a Trojan?

A Trojan is malware that hides behind something that appears legitimate. It may look like a useful program, document, installer, update, invoice, game, or security tool, but once opened it performs unwanted actions on the device.

Short definition

A Trojan is disguised malware. Unlike malware that spreads by itself, a Trojan usually relies on a person to install or open it because the file or application appears safe, familiar, or useful.

At a glance: A Trojan wins trust before it runs. The disguise is the delivery strategy; the payload is the real damage.

Trojan Meaning

Trojans are common because they fit naturally into phishing and download behavior. People open files, install tools, accept updates, and download software to get work done. Attackers hide malware inside those familiar actions.

The malicious behavior can vary. Some Trojans steal credentials. Others open remote access, install spyware, download ransomware, change system settings, or join the device to a botnet. The user may only see the decoy application or document while the background activity continues.

Trojans can be distributed through email attachments, fake software sites, sponsored ads, file-sharing platforms, compromised websites, messaging apps, and removable media. The more the file matches what the user expected, the more likely it is to be opened.

For organizations, Trojans are dangerous because they often serve as the first stage of a larger compromise. One disguised file can lead to stolen credentials, lateral movement, data theft, or a later ransomware event.

How Trojans Work

A Trojan uses disguise and user trust to get malicious code onto a device.

  1. The attacker prepares a decoy. The file may look like software, an invoice, a resume, an update, a report, or a helpful utility.
  2. The user is convinced to open it. The lure may arrive through phishing, ads, search results, shared links, or fake support instructions.
  3. The payload runs. The Trojan may install malware, create persistence, contact an attacker, or change settings.
  4. Additional actions follow. It may download more tools, steal data, log keystrokes, or open remote access.
  5. The attacker uses the foothold. The compromised system can support account takeover, data theft, ransomware, or broader intrusion.

Common Trojan Examples

Trojan lures often imitate useful or expected files.

  • Fake invoice file: An attachment appears to be a bill but installs malware when opened or enabled.
  • Software installer: A download claims to be a legitimate tool but includes malicious code.
  • Fake browser update: A web page says the user must update software and provides a Trojan installer.
  • Remote access Trojan: The malware gives an attacker remote control over the device.
  • Banking or credential Trojan: The malware watches browser activity, captures credentials, or modifies transactions.

Why Trojans Matter

Trojans are effective because they ask the user to do something ordinary. Opening a document, installing a tool, or accepting an update can feel routine.

Inside a business, a Trojan can turn one trusted-looking file into credential theft, data exposure, remote access, malware deployment, financial fraud, or ransomware staging. It may also disable security tools or create persistence so the attacker can return later.

Trojans also connect human risk with technical compromise. A phishing email or malicious ad may only be the first step. The Trojan turns that interaction into access on a real device.

How to Reduce Trojan Risk

Trojan prevention starts with safer software and file-handling habits.

  • Use approved software sources. Install tools from managed catalogs, official vendor pages, or trusted internal portals.
  • Treat unexpected files carefully. Invoices, resumes, reports, and updates should match the expected sender and workflow.
  • Keep systems patched. Patching reduces the chance that a Trojan can exploit known weaknesses after it runs.
  • Use endpoint protection. Endpoint tools can detect suspicious behavior, payload downloads, persistence, and command activity.
  • Report fake prompts. Fake updates, security warnings, and software download pages should be reported before users install anything.

What to Do if a Trojan Is Suspected

A suspected Trojan should be treated as a possible foothold, not just a bad file.

  1. Disconnect the device. Isolate the system to reduce further command activity or spread.
  2. Preserve the file and source. Keep the email, link, download page, file name, and timestamps for investigation.
  3. Check for follow-on activity. Review new processes, persistence, outbound connections, account logins, and additional payloads.
  4. Reset exposed access. Change credentials from a clean device if the Trojan could have captured passwords or tokens.

Related Trojan Terms

Trojans often deliver or enable other malware categories.

  • Keylogger covers malware that records user input after infection.
  • Ransomware explains one high-impact payload that can follow initial malware access.

Trojan Takeaway

A Trojan is dangerous because the user may invite it in by trusting the disguise. The file or application looks useful while the payload works quietly.

Safer habits around downloads, attachments, and fake updates reduce the chances that a disguised file becomes a real compromise.

Share This Page

Send this glossary page to a teammate, client, or employee who needs a quick explanation.

FAQ

Questions Teams Ask About Trojans

Quick answers about disguised malware, fake downloads, remote access, and safer file handling.

What is a Trojan in cybersecurity?

A Trojan is malware disguised as legitimate software, a useful file, or a trusted update so a user will run it or install it.

Why is it called a Trojan?

The name comes from the Trojan horse story: the harmful payload is hidden inside something that appears safe or useful.

What can a Trojan do?

A Trojan can install backdoors, steal data, log keystrokes, download more malware, give remote access, or prepare the system for ransomware.

How do users get Trojans?

Common paths include phishing attachments, fake downloads, cracked software, malicious ads, fake updates, and compromised websites.