The tale of the fall of troy is one of the most ancient and known stories of the great collection of Greek mythology where Greeks won the war deception. The deception was carried out by giving the city of troy a huge wooden horse as a parting gift and a sign of defeat by Greeks but soldiers were hidden inside the horse waiting to strike when the time is right. Malicious software is designed to play a similar kind of role as the Trojan horse. It is spread the same way as any other virus; by tricking users.
It is one of those kinds of malware that is disguised as a genuine link or software to get a swift entrance into a computer system. Often confused for a virus, a Trojan horse lacks an inherent trait which helps it be distinguished; it cannot replicate itself and entirely relies on tricking innocent and naïve users to install infected software.
Trojan Horses Malware comes in a variety of kinds, each causing more damage if not more than the others and committing high-level privacy breach.
• Backdoor Trojan
This Trojan makes your device a zombie computer which means it cannot detect by itself if it has been infected with malware. Computers infected with this malware may become part of a botnet and easily be accessed and controlled by the hackers using a remote device. What is worse is this malware goes undetected even by some of the most advanced and trusted detectors.
• Downloader Trojan
Though not converting your device into a zombie computer, this trojan can cause a lot of damage too by installing unwanted data on the hard drive in the form of applications and files and can even upgrade malware. All these things are done without it seeking permission and therefore dramatically decreased space in the hard drive may be a sign of the presence of any malware on a device since downloader trojan is not the only Malware that uses hard disk data.
• Distributed Denial of Service (DDoS) Trojan
Trojan cannot function until a software containing it is installed in the system which means it has a strong setup and cannot be easily be removed because of its' feature of hiding itself. All these things make it appropriate for being used in larger-scale attacks including DDoS. Modified as a DDoS malware, it can spread into an entire network or at least a large number of devices; enough to create a botnet and carry out a Distributed Denial of Service attack.