Trojans are a specific type of malware that infects the target device by disguising itself as a legitimate application. Like the mythical Trojan Horse described in Homer’s Odyssey, it infiltrates the system by pretending to be something it is not.
In the original story, the Greeks hid inside a giant wooden horse after failing to capture the city of Troy. The Trojans interpreted the horse as a gift from the gods to reward their patience and piety. After the Trojans moved the horse inside the city gates, the Greeks came out and opened the gates so the rest of the army could enter.
Modern trojan malware works the same way as its ancient namesake. An attacker may hide malicious code in a legitimate file or document sent by email. When a user opens the attachment, it runs the malicious code, embedding itself in the system and taking control of that device.
From there, the attacker may try to disable the device’s security controls and target it with more disruptive malware. Alternatively, the attacker may conduct reconnaissance and perform lateral movement across the network, hoping to gain access to more valuable systems.
In a typical scenario, the malicious code may not actually activate until the user takes a predefined action. For example, the trojan may wait until the victim opens a secure work login page to start logging keystrokes. This could pave the way for a credential-based attack with catastrophic results.
Some of the most common ways users introduce trojans onto their devices include:
Historically, most trojans target PCs running Windows, with a small minority targeting Macs and Linux devices. However, modern trojans now target the entire spectrum of endpoint devices — from desktops and laptops to smartphones and tablets running a wide range of operating systems.
Mobile trojans may have wider capabilities that exploit the portable nature of the infected device. For example, the attacker may program the trojan to activate once an infected device connects to a corporate Wi-Fi connection and try to infect other devices from there.
Trojans are sometimes referred to as “Trojan Horse Viruses” or “Trojan Viruses”, but this term is misleading. Viruses are a type of malware that can replicate and self-execute. Trojans don’t do either of these things — they require specific, deliberate action from the target.
Similarly, worms are designed to self-replicate and spread across devices in a network. Some trojans like QakBot have worm-like functionality, allowing them to spread throughout a network on their own. But QakBot is still considered a trojan because the initial exploit relies on tricking a user into executing a malicious script hidden in a seemingly legitimate application.
The concept behind trojan malware is broad and applies well to many attack scenarios. Here are some examples of popular types of trojans and how they work:
Preventing trojan horse attacks requires developing good security policies and communicating them to users throughout the network. Cybersecurity awareness training can help users reduce risky behaviors and identify suspicious activities before they result in cyberattacks.
Some of the things users can do to prevent trojan horse attacks include:
Security leaders and IT administrators need to enforce good cyber hygiene by developing strong policies and making sure users understand them. Some of the things you can do to protect your organization from trojan attacks include:
Once a trojan infects a network asset, the incident response team must isolate the device from the rest of the network. If your network security architecture is segmented according to Zero Trust principles, the immediate damage should be minor.
Detecting the initial infection relies on implementing tools capable of monitoring devices and assets for unusual behavior. It demands in-depth visibility into every corner of the enterprise tech stack and a well-equipped Security Operations Center (SOC).
The following tools and platforms can help you neutralize trojan malware threats early on, limiting the damage and ensuring business continuity:
The best solutions utilize machine learning to block trojan malware executions without relying on a previously known threat signature. Highly automated detection and response services like Lumifi ShieldVision™ keep organizations on top of evolving threats at a moment’s notice.
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.