Trojan Horse (Trojan)

SHARE
Facebook
Twitter

Trojan Horse (Trojan) is a type of malware disguised as a legitimate program or file. Once downloaded and opened, it creates a backdoor for attackers to steal data, control your device, or spy on your activity — all without your knowledge.

How it happens and red flags to look out for

  • Often disguised as an attachment like a PDF, software update or invoice, when you open it, It installs malware that steals login details and facilitates fraudulent payments without your knowledge.
  • Your device suddenly runs slow, crashes, or behaves oddly.
  • Unexpected pop-ups, redirects, or programs appear.
  • You notice unauthorized transactions or login attempt.

How to respond and protect yourself or organisation

  • Do not open suspicious attachments or downloads — even if they seem to come from someone you know.
  • Use antivirus software and keep it updated.
  • Implement cyber threat hunting tools to assist your organisation in detecting malware and other malicious applications.

Reporting options

Related Articles

FRAUD

Fraud Alert

Fraud is more than just a crime—it’s a global threat that silently drains billions from economies, shatters businesses, and ruins lives. From Social engineering, Cyber scams and identity theft to corporate deception, embezzlement and financial misstatements, fraud erodes trust in systems we rely on daily.

FRAUD

Spyware

Spyware involves the use of malicious software to covertly infiltrate computers or networks with the intent of collecting sensitive information. The information collected can then be used by fraudsters to commit fraud, including unauthorised access to bank accounts, theft of corporate data, and manipulation of financial transactions.

FRAUD

Keylogger

Keyloggers are programs that record everything you type, including passwords, emails, and credit card numbers. Installed via Trojans or malicious downloads.