Trojans

Table of Contents

What is a Trojan?

A Trojan (Trojan horse) is a computer program which, camouflaged in the background, performs completely different functions or pursues motives.

By a Social Engineeringscam tricked the user into downloading and installing a program containing a Trojan horse. Activation gives cyber criminals the opportunity to spy on the user and obtain confidential data.

Malicious software is secretly installed as soon as the program is run, which then runs autonomously and independently. Deleting the Trojan program has no effect on the malicious program.

However, a Trojan does not necessarily have to be a malicious program. As soon as a program hides a non-obvious functionality that has no harmful effects, it is called a Trojan.

The different types of Trojans

Trojans are constantly evolving, resulting in different types of Trojans in circulation.
Don't let yourself be foisted with a Trojan!
With our penetration test we will find your weak point!
Inquire now

How do you "catch" a Trojan?

It is primarily the user who infects a system with a Trojan. Users fall for the tricks and deceptions of cyber criminals and assume they have useful software installed. Another danger is if the system is not properly patched to the current state. This creates a multitude of attack vectors.

The four routes of infection

Software that has been downloaded

Trojans often hide on websites that generally offer software. Many programs are uploaded to such platforms every day, so that a test tailored to each software can no longer be guaranteed. Accordingly, many programs are infected with Trojans that can infect the user's system.

Social Media

Many social media platforms offer instant messaging services to communicate via chat function. Videos and pictures can be shared via such channels, whereby a link is sent to all of the user's contacts as soon as they are clicked on. After the link has been opened, the user unknowingly downloads a file that may contain a Trojan.

Email notes

It is common for cyber criminals to send credible emails claiming to be from companies like Amazon or Paypal. These emails often contain pictures and videos, but usually also links. As soon as you open the file or a link, the Trojan can install itself in the system.

Behavior if you are already infected

External service providers use specially developed software solutions to help determine the origin of the Trojan.

The vulnerabilities and vulnerabilities

A Trojan horse can also infect an IT system in which it had previously installed itself via a worm or other worm Malware via so-called 0-days or via known security gaps, for example due to the lack of security updates.

4 immediate measures in the event of a Trojan attack

  • All contacts in the organization should be contacted first
  • Back up system logs, log data and other helpful information
  • The headquarters Point of contact for cybercrime (ZAC) at the State Criminal Police Office should be informed immediately. Also file a criminal complaint.
  • Report the matter to your cyber insurance company (if you have one)
A Trojan is in your system?
We can actively support and go through the first steps with you,
to avoid fatal consequences.
Contact us

Our Conclusion

In order to uncover possible weak points in your company, you should consult a professional Penetration test have it carried out. In the penetration test, your IT system is manually analyzed for weaknesses in order to show you where there is a need for action. It is important that not only the technology but also the human factor is taken into account.

Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!