Access free live classes and tests on the app
Download
+
Unacademy
  • Goals
    • AFCAT
    • AP EAMCET
    • Bank Exam
    • BPSC
    • CA Foundation
    • CAPF
    • CAT
    • CBSE Class 11
    • CBSE Class 12
    • CDS
    • CLAT
    • CSIR UGC
    • GATE
    • IIT JAM
    • JEE
    • Karnataka CET
    • Karnataka PSC
    • Kerala PSC
    • MHT CET
    • MPPSC
    • NDA
    • NEET PG
    • NEET UG
    • NTA UGC
    • Railway Exam
    • SSC
    • TS EAMCET
    • UPSC
    • WBPSC
    • CFA
Login Join for Free
avtar
  • ProfileProfile
  • Settings Settings
  • Refer your friendsRefer your friends
  • Sign outSign out
  • Terms & conditions
  • •
  • Privacy policy
  • About
  • •
  • Careers
  • •
  • Blog

© 2023 Sorting Hat Technologies Pvt Ltd

  • Exams
    • SBI Exams
      • SBI PO
      • SBI Clerk
      • SBI SO
    • IBPS Exams
      • IBPS PO
      • IBPS Clerk
      • IBPS RRB
      • IBPS SO
    • LIC Exams
      • LIC Assistant
      • LIC AAO
      • LIC ADO
    • RBI Exams
      • RBI Grade B
      • RBI Assistant
  • Notifications
    • Upcoming Bank Exam
    • Syllabus
      • IBPS Syllabus
        • IBPS PO Syllabus
        • IBPS Clerk Syllabus
        • IBPS RRB Syllabus
        • IBPS SO Syllabus
      • SBI Syllabus
        • SBI PO Syllabus
        • SBI Clerk Syllabus
      • LIC Syllabus
        • LIC Assistant Syllabus
        • LIC AAO Syllabus
        • LIC ADO Syllabus
      • RBI Syllabus
        • RBI Assistant Syllabus
  • Study Material
    • Magazine Download
    • Bank Exams Notes
  • Tests & Practice
    • Scholarship Test
    • Test Series
    • Learning Festival
  • Rankers Guide
    • Paper Analysis
Bank Exam » Bank Exam Study Materials » Computer Knowledge » Notes on Trojan Horse
insurance_banking_exams

Notes on Trojan Horse

Trojan horse is a malfunction that is destructive to the computer device. The attacker takes control of the computer and can take all information. Read it here.

Table of Content
  •  

A Trojan horse, in computing, is a type of malicious program that appears to perform a desirable function but instead contains hidden code that allows the attacker to take control of the system. It has been used many times in history to gain access to systems without the knowledge or permission of the users. In this article, we will discuss what is Trojan horses, how they work, and some famous examples from history!

What is a trojan horse?

Trojan horse is a malicious program that is destructive. It can be used to steal data or passwords, or even to take over control of your computer. Trojan horses are often disguised as useful or interesting files, so be very careful what you download and open on your computer. After discussing what is trojan horse let’s talk about its types.

What are the types of trojan horses?

There are different types of the trojan horse including backdoor trojan, downloader trojan, fake AV trojan, game thief trojan, ransom trojan, info stealer trojan, malfinder trojan, rootkit trojan, SMS trojan, trojan banker

Backdoor trojan: This type of trojan horse provides the attacker with remote access to the infected system.

Downloader trojan: This type of trojan horse is used to download and install other malicious programs on the infected system.

Fake AV trojan: This type of trojan horse tricks the user into believing that they are installing a legitimate security program.

Game thief trojan: This type of trojan horse is designed to steal gaming credentials from the infected system.

Ransom trojan: This type of trojan horse is designed to encrypt the contents of the infected system and then demand a ransom payment to unlock them.

Info stealer trojan: This type of trojan horse is designed to steal sensitive information from the infected system.

Malfinder trojan: This type of trojan horse is designed to delete or disable important files on the infected system.

Rootkit trojan: This type of trojan horse is designed to hide the presence of other malicious programs on the infected system.

SMS trojan: This type of trojan horse is designed to send SMS messages to premium-rate numbers without the consent of the user.

Trojan banker: This type of trojan horse is designed to steal banking credentials from the infected system.

What are the symptoms of a trojan horse infection?

Some of the common symptoms of a trojan horse infection include unexpected system crashes, loss of data, a slowdown in computer performance, and the display of intrusive or unwanted advertisements. In some cases, a trojan horse infection may also result in the theft of personal information or financial data.

What can you do to protect your computer from trojan horse infections?

There are a few things that you can do to help protect your computer from trojan horse infections. First, make sure that you have a good antivirus program installed and up to date. You should also keep your operating system and programs up to date, as many trojan horses exploit vulnerabilities in outdated software. Additionally, be careful what you download and open – make sure that you only download files from reputable sources, and be suspicious of any unsolicited emails or attachments. Finally, be aware of what you’re doing when you’re online – don’t click on suspicious links or download unknown files. If you follow these tips, you can help protect your computer from trojan horse infections.

The incident of trojan attacks malware

Trojan attacks have become more sophisticated and destructive in recent years. A trojan is a type of malware that disguises itself as a legitimate program to infect the computer system and gain control over it. In Rakhni Trojan, for instance, the attackers used a malicious program that was disguised as an Adobe Flash installer to infect victims’ computers. Once installed, the trojan would encrypt the user’s files and demand a ransom payment to decrypt them.

Zeus/Zbot is another incident that was released in the year 2011 where it managed to steal an estimated $100 million from banks. The trojan was disguised as a software update for Adobe Flash or Java and once installed, it would steal the user’s bank login credentials and other personal information.

Conclusion

Trojan horse is a malicious program that is destructive. It can cause serious damage to the infected system and also to the networks it is connected to. It is important to be aware of the dangers that trojan horse poses and take steps to protect your system from being infected. If you believe your system may have been infected with a trojan horse, please contact the concerned department for assistance that can help you remove the infection and control from your computer system.

faq

Frequently asked questions

Get answers to the most common queries related to the Bank Examination Preparation.

What is a Trojan Horse?

Ans. A Trojan Horse, also known as a malicious program, is a type of destructive software that is used to damage or ...Read full

What are the different types of Trojan Horses?

Ans. There are many different types of Trojan Horses, but some of the most common include backdoor trojan, malfinder...Read full

What are the effects of a Trojan Horse?

Ans. The effects of a Trojan Horse can be devastating, as they can cause computers and networks to crash, be infecte...Read full

How can you protect your computer from a Trojan Horse?

Ans. There are several ways that you can protect your computer from a Trojan Horse, including using anti-virus softw...Read full

What should you do if your computer is infected with a Trojan Horse?

Ans. If your computer is infected with a Trojan Horse, you should immediately disconnect it from the internet and co...Read full

Ans. A Trojan Horse, also known as a malicious program, is a type of destructive software that is used to damage or disable computers, networks, and computer systems.

Ans. There are many different types of Trojan Horses, but some of the most common include backdoor trojan, malfinder trojan, destructive trojan, and password stealer trojan.

Ans. The effects of a Trojan Horse can be devastating, as they can cause computers and networks to crash, be infected with malware, or have their data stolen.

Ans. There are several ways that you can protect your computer from a Trojan Horse, including using anti-virus software, keeping your software up to date, and being careful about what websites you visit and what files you download.

Ans. If your computer is infected with a Trojan Horse, you should immediately disconnect it from the internet and contact your IT department or anti-virus software provider for help.

Crack Bank Exam with Unacademy

Get subscription and access unlimited live and recorded courses from India’s best educators

  • Structured syllabus
  • Daily live classes
  • Ask doubts
  • Tests & practice
Learn more

Notifications

Get all the important information related to the Bank Exam including the process of application, important calendar dates, eligibility criteria, exam centers etc.

Bank Exam Application Process
IBPS Clerk Notifications
IBPS Clerk Result – Check Prelims Exam Result Link
IBPS PO Notifications
IBPS PO Result
IBPS PO Syllabus 2023 for Prelims and Mains Exam
SBI Clerk Notifications
SBI Clerk Result – SBI Clerk Mains Result 2023 Out
SBI PO Admit Card 2022 – Link(Soon), Steps to Download
SBI PO Notifications 2022 – Check Eligibility, Exam Date, Syllabus, Exam Pattern
SBI PO Result
SBI PO Syllabus 2023, Prelims and Mains Syllabus in Detail
See all

Related articles

Learn more topics related to Computer Knowledge
Windows Operating System

This article discusses the Windows operating system and gives a detailed view on several versions of them. In this article you will get to know about major features and also a historical background of the Windows operating system.

What Is A Wireless Connection?

These days, hardly there's anyone who doesn't use the internet connection these days in their daily life. The Internet has become an essential part of our life because everything has gone online. From food to friends or education to entertainment, everything is present on the Internet.

WAN

This article helps us in understanding the basic meaning of the Internet's biggest WAN or Wide Area Network and the principle behind it, its applications in computer networks, its advantages, and disadvantages,

VPN

Virtual Private Network(VPN) helps guard your privacy by establishing an encrypted connection. It hides your IP address, after which no one can see or trace your activity.

See all
Access more than

12,591+ courses for Bank Exams 

Get subscription

Trending Topics

  • IBPS Clerk Exam Analysis 2022
  • Bank Exam Notifications
  • IBPS-PO Eligibility Criteria
  • IBPS PO Exam Pattern
  • IBPS PO Application Process
  • SBI Clerk Exam Pattern
freeliveclasses_bankexams

Related links

  • Bank Exam Study Materials
  • SBI Clerk Result
  • IBPS PO Syllabus
  • IBPS Clerk Result
  • IBPS PO Salary
  • IBPS Clerk Syllabus
  • IBPS Calendar 2023
  • RBI Grade B Officer
  • RRB PO Exam Pattern
  • RRB Exam Syllabus
  • RRB NTPC Exam Pattern
  • General Awareness for Bank Exams
  • RRB Clerk Exam Date 2023
testseries_bankexams
Download Free English Magazine
Company Logo

Unacademy is India’s largest online learning platform. Download our apps to start learning


Starting your preparation?

Call us and we will answer all your questions about learning on Unacademy

Call +91 8585858585

Company
About usShikshodayaCareers
we're hiring
BlogsPrivacy PolicyTerms and Conditions
Help & support
User GuidelinesSite MapRefund PolicyTakedown PolicyGrievance Redressal
Products
Learner appLearner appEducator appEducator appParent appParent app
Popular goals
IIT JEEUPSCSSCCSIR UGC NETNEET UG
Trending exams
GATECATCANTA UGC NETBank Exams
Study material
UPSC Study MaterialNEET UG Study MaterialCA Foundation Study MaterialJEE Study MaterialSSC Study Material

© 2025 Sorting Hat Technologies Pvt Ltd

Unacademy
  • Goals
    • AFCAT
    • AP EAMCET
    • Bank Exam
    • BPSC
    • CA Foundation
    • CAPF
    • CAT
    • CBSE Class 11
    • CBSE Class 12
    • CDS
    • CLAT
    • CSIR UGC
    • GATE
    • IIT JAM
    • JEE
    • Karnataka CET
    • Karnataka PSC
    • Kerala PSC
    • MHT CET
    • MPPSC
    • NDA
    • NEET PG
    • NEET UG
    • NTA UGC
    • Railway Exam
    • SSC
    • TS EAMCET
    • UPSC
    • WBPSC
    • CFA

Share via

COPY