Files
windows-itpro-docs/windows/security/intelligence/trojans-malware.md
Beth Levin cba4e4d0d7 Updates
2018-07-31 10:27:52 -07:00

44 lines
1.8 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
title: Trojan malware
description: Learn about how trojans work, deliver malware do your devices, and what you can do to protect yourself.
keywords: security, malware
ms.prod: w10
ms.mktglfcycl: secure
ms.sitesec: library
ms.localizationpriority: medium
ms.author: dansimp
author: dansimp
ms.date: 07/01/2018
---
# Trojan malware
Trojans are a common type of malware which, unlike viruses, cant spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them.
Trojans often use the same file names as real and legitimate apps. It is easy to accidentally download a trojan thinking that it is a legitimate app.
## How trojans work
Trojans can come in many different varieties, but generally they do the following:
- Download and install other malware, such as viruses or worms.
- Use the infected PC for click fraud.
- Record keystrokes and websites visited.
- Send information about the infected PC to a malicious hacker including passwords, login details for websites, and browsing history.
- Give a malicious hacker control over the infected PC.
## How to protect against trojans
Use the following free Microsoft software to detect and remove it:
- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows.
- [Microsoft Safety Scanner](https://www.microsoft.com/wdsi/products/scanner)
You should also run a full scan. A full scan might find other, hidden malware.
For more general tips, see [prevent malware infection](prevent-malware-infection.md).