Cyber Awareness Bulletin
The following cyber awareness bulletin was issued by the State of Alaska. The information may or may not be applicable to the general public and accordingly, the State does not warrant its use for any specific purposes.
A Trojan Horse is a seemingly benign program or application which, unknown to the user, contains malicious code.
A Trojan What!?
As it relates to malware, a Trojan horse is defined as "an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data."
For example, you might download and install what appears to be a harmless freeware game, but when you run the program, it unleashes a payload that could erase your disk, install a keystroke logger, or let a remote hacker gain access to your computer. Once they have control, a hacker may steal your identity or use your system to commit other attacks.
When downoading or installing new software, be sure to practice due diligence. Thoroughly research any product or application before you install it. Software applications that install Trojan horses can quickly earn a negative reputation on the Internet. A quick google search will often help you discover these programs.
Furthermore, pirated software often includes Trojan horse software.