1.8 KiB
title, description, keywords, ms.prod, ms.mktglfcycl, ms.sitesec, ms.localizationpriority, ms.author, author, ms.date
title | description | keywords | ms.prod | ms.mktglfcycl | ms.sitesec | ms.localizationpriority | ms.author | author | ms.date |
---|---|---|---|---|---|---|---|---|---|
Trojan malware | Learn about how trojans work, deliver malware do your devices, and what you can do to protect yourself. | security, malware | w10 | secure | library | medium | dansimp | dansimp | 08/01/2018 |
Trojan malware
Trojans are a common type of malware which, unlike viruses, can’t spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them.
Trojans often use the same file names as real and legitimate apps. It is easy to accidentally download a trojan thinking that it is a legitimate app.
How trojans work
Trojans can come in many different varieties, but generally they do the following:
-
Download and install other malware, such as viruses or worms.
-
Use the infected PC for click fraud.
-
Record keystrokes and websites visited.
-
Send information about the infected PC to a malicious hacker including passwords, login details for websites, and browsing history.
-
Give a malicious hacker control over the infected PC.
How to protect against trojans
Use the following free Microsoft software to detect and remove it:
-
Windows Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for previous versions of Windows.
You should also run a full scan. A full scan might find other, hidden malware.
For more general tips, see prevent malware infection.