Malware disguised as legitimate software that tricks users into installing it. Unlike viruses, trojans don't replicate themselves — they rely on social engineering to convince victims to download and execute them.
Malware disguised as legitimate software that tricks users into installing it. Unlike viruses, trojans don't replicate themselves — they rely on social engineering to convince victims to download and execute them.
Think you've been targeted?
Paste the suspicious content here for an instant analysis.
No signup · 6 detection layers · Results in seconds · Cmd+Enter
Named after the legendary Trojan Horse of Greek mythology, trojan malware disguises itself as something useful or desirable. It might appear to be a free game, a utility program, a software crack, or even a security tool — but conceals malicious code within.
Trojans are one of the most versatile forms of malware. Once installed, they can create backdoors for remote access, log keystrokes, steal banking credentials, download additional malware, or enroll the device in a botnet.
Banking trojans are particularly dangerous, intercepting financial transactions in real time. They can modify what you see on your bank's website while silently redirecting your money to accounts controlled by criminals.
The Zeus trojan, first detected in 2007, targeted banking credentials and was used to steal over $100 million. It spread through phishing emails and drive-by downloads, and its source code was eventually leaked, spawning dozens of variants that are still active today.