--- title: Trojan malware description: Learn about how trojans work, deliver malware do your devices, and what you can do to protect yourself. keywords: security, malware ms.prod: w10 ms.mktglfcycl: secure ms.sitesec: library ms.localizationpriority: medium ms.author: dansimp author: dansimp ms.date: 08/01/2018 --- # Trojan malware Trojans are a common type of malware which, unlike viruses, can’t spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them. Trojans often use the same file names as real and legitimate apps. It is easy to accidentally download a trojan thinking that it is a legitimate app. ## How trojans work Trojans can come in many different varieties, but generally they do the following: - Download and install other malware, such as viruses or worms. - Use the infected PC for click fraud. - Record keystrokes and websites visited. - Send information about the infected PC to a malicious hacker including passwords, login details for websites, and browsing history. - Give a malicious hacker control over the infected PC. ## How to protect against trojans Use the following free Microsoft software to detect and remove it: - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows. - [Microsoft Safety Scanner](https://www.microsoft.com/wdsi/products/scanner) You should also run a full scan. A full scan might find other, hidden malware. For more general tips, see [prevent malware infection](prevent-malware-infection.md).