DDoSPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

Trojan Horse

A Trojan Horse (named after that of Greek mythology) is a malicious computer program masquerading itself as useful or otherwise non-malicious.  Once executed, Trojan Horses often install a backdoor, allowing for remote access of the infected machine. This allows an attacker to perform various criminal tasks including but not limited to: use of the machine as a zombie within a botnet to perform distributed denial-of-service ( DDoS ) attacks, data theft, downloading or installing of additional malware , modification or deletion of files, keylogging, watching the user's screen, crashing the computer, and anonymous internet viewing. They are typically distrubuted vai malspam botnets.

Examples of popular Trojan Horses include: Emotet, Trickbot, Kovter, ZeuS, NanoCore and Redyms

DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center