IsThisAScam
Laman UtamaBlogHargaTentangHistoryAPIExtension
Upgrade
MS
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produk
  • Home
  • Blog
  • Pricing
  • Tentang
  • History
  • Chrome Extension
Resources
  • Developers
  • Dokumentasi API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Undang-undang
  • Dasar Privasi
  • Terma Perkhidmatan
  • product@zeplik.com

© 2026 Zeplik, Inc. Hak cipta terpelihara.

Built for the calm, the cautious, and the careful.

Home/Glossary/Trojan
Glossary · Technical Concept

What Is a Trojan?

Malware disguised as legitimate software that tricks users into installing it. Unlike viruses, trojans don't replicate themselves — they rely on social engineering to convince victims to download and execute them.

Quick Definition

Malware disguised as legitimate software that tricks users into installing it. Unlike viruses, trojans don't replicate themselves — they rely on social engineering to convince victims to download and execute them.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Trojan explained.

Named after the legendary Trojan Horse of Greek mythology, trojan malware disguises itself as something useful or desirable. It might appear to be a free game, a utility program, a software crack, or even a security tool — but conceals malicious code within.

Trojans are one of the most versatile forms of malware. Once installed, they can create backdoors for remote access, log keystrokes, steal banking credentials, download additional malware, or enroll the device in a botnet.

Banking trojans are particularly dangerous, intercepting financial transactions in real time. They can modify what you see on your bank's website while silently redirecting your money to accounts controlled by criminals.

02How it works.

01The trojan is disguised as legitimate software — a game, utility, update, or document
02The victim downloads and installs it, believing it to be safe
03The trojan installs itself alongside (or instead of) the expected software
04It performs its malicious function while appearing to work normally
05Data is stolen, a backdoor is created, or additional malware is downloaded

03Real-world example.

The Zeus trojan, first detected in 2007, targeted banking credentials and was used to steal over $100 million. It spread through phishing emails and drive-by downloads, and its source code was eventually leaked, spawning dozens of variants that are still active today.

04How to protect yourself.

01Only download software from official sources and app stores
02Be skeptical of free versions of normally paid software
03Keep your antivirus software updated and run regular scans
04Don't download email attachments you weren't expecting
05Check software reviews and verify the developer before installing
Related Terms
MalwareKeyloggerSpywareBotnetSocial Engineering
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →