Secure your small business:
Apps → Data →

Overview: Trojan Horse

Quick Definition

A Trojan Horse is a malware attack in which users are fooled into installing malicious code on a computing system. Named from the Trojan War story of Greek subterfuge, trojan horse attacks often involve software, code, or links that claim to offer desired functionality to a user but that also carry hidden software that performs illicit activity once installed.

Two forms of trojan horse software include ransomware, which locks a workstation and its data until a ransom is paid, and remote access trojans (RATs), which hide in the background to enable a remote attacker to easily take control of a workstation over the Internet. Another common form may capture a user's keystrokes, including usernames, passwords, and account data, and send these to a third party.

Stats and Overview


Stats and Overview

Remote Access Trojan (RAT)

Deep Dive

Trojan Horse

Need Trojan Horse solutions?
We can help!

Plurilock offers a full line of industry-leading cybersecurity, technology, and services solutions for business and government.

Talk to us today.


Thanks for reaching out! A Plurilock representative will contact you shortly.

Subscribe to the newsletter for Plurilock and cybersecurity news, articles, and updates.

You're on the list! Keep an eye out for news from Plurilock.