SlideShare a Scribd company logo
ICT-ED INSTITUTE OF SCIENCE
AND TECHNOLOGY INC.
Innovation for Quality Education
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
TOPICS TO DISCUSS:
•Introduction of Trojan Horse
•How do Trojan works
•Types of Trojan Horse
•How to Recognize a Trojan Attack
•Examples of Trojan Horse Attacks
•How to prevent Trojan Horse
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
IS A TROJAN A VIRUS OR MALWARE?
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
WHAT IS A TROJAN HORSE?
•Trojan horse is a type of malware that downloads onto a
computer and disguised as a legitimate program.
•Typically gets hidden as an attachment in an email or a
free-to-download file, then transfers onto the user’s
device.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
BRIEF HISTORY OF THE TROJAN HORSE
•The Trojan gets its name from the Trojan Horse in the Greek epic
poem The Iliad. In the story, the Greek hero Odysseus hatches a
plan to construct a giant wooden horse that his enemies would
receive into their city as a gift. The enemies of the city of Troy were
able to get inside the city gates using a horse they pretended was a
gift but within the belly of the horse hid a legion of soldiers, who
emerged under cover of night to decimate the city of Troy from
within.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW DO TROJAN WORKS?
•Trojans work by masquerading as legitimate files,
with the goal of tricking victims into clicking,
opening, or installing them. Once this happens, the
Trojan begins installing malware on your
device, spying on you, or causing other types of
harm.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
1. Backdoor Trojans: A backdoor Trojan enables an attacker to gain remote access to
a computer and take control of it using a backdoor.
2. Banker Trojan: A banker Trojan is designed to target users’ banking accounts and
financial information.
3. Distributed denial-of-service (DDoS) Trojans: These Trojan programs carry out
attacks that overload a network with traffic.
4. Dropper or downloader Trojans: A downloader Trojan targets a computer that has
already been infected by malware, then downloads and installs more malicious
programs to it.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
5. Exploit Trojan: An exploit malware program contains code or data that takes
advantage of specific vulnerabilities within an application or computer system.
6. Fake antivirus Trojan: A fake antivirus Trojan simulates the actions of legitimate
antivirus software.
7. Game-thief Trojan: A game-thief Trojan is specifically designed to steal user
account information from people playing online games.
8. Instant messaging (IM) Trojan: This type of Trojan targets IM services to steal
users’ logins and passwords. It targets popular messaging platforms such as AOL
Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
9. Info stealer Trojans: Data theft is the goal with info stealer Trojans. They’ll comb
through your device for sensitive personal data, then send it back to the hacker who
attacked you.
10. Mailfinder Trojan: aims to harvest and steal email addresses that have been
stored on a computer.
11. Ransom Trojan: seek to impair a computer’s performance or block data on the
device so that the user can no longer access or use it.
12. Remote access Trojan: Similar to a backdoor Trojan, this strand of malware gives
the attacker full control of a user’s computer.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
MOST COMMON TYPES OF TROJAN MALWARE
13. Rootkit Trojan: is a type of malware that conceals itself on a user’s computer.
14. Short message service (SMS) Trojan: infects mobile devices and is capable
of sending and intercepting text messages.
15. Spy Trojan: are designed to sit on a user’s computer and spy on their activity.
16. Sunburst: was released on numerous SolarWinds Orion Platform. Victims
were compromised by trojanized versions of a legitimate SolarWinds digitally
signed file named: SolarWinds.Orion.Core.BusinessLayer.dll
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW TO RECOGNIZE A TROJAN ATTACK
• Your computer feels slow.
• Your computer crashes and freezes.
• There are unfamiliar apps on your device.
• Internet redirects.
• Changes to your desktop, taskbar, or browser.
• More pop-ups.
• Your antivirus software is deactivated.
• The best way to recognize a Trojan is to search a device using a Trojan
scanner or malware-removal software.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
EXAMPLES OF TROJAN HORSE ATTACKS
1. Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool
which enables an attacker to use a device to mine cryptocurrency to infect devices.
2. Tiny Banker: enables hackers to steal users’ financial details. It was discovered
when it infected at least 20 U.S. banks.
3. Zeus or Zbot: Zeus is a toolkit that targets financial services and enables
hackers to build their own Trojan malware. The source code uses techniques like
form grabbing and keystroke logging to steal user credentials and financial details.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
EXAMPLES OF TROJAN HORSE ATTACKS
4. Emotet- First detected in 2014, Emotet began as a banking Trojan. But after
cybercriminals began using it to distribute other malware instead, Emotet made
serious waves in cybersecurity.
5. Shedun- Trojans aren’t just for Windows. Shedun is an Android adware Trojan
horse that repackages legitimate Android apps with bogus adware, before rehosting
them on third-party download portals. When you install the app from one of these
sites, you get the adware along with it.
By 2016, Shedun was reported to have infected over 10 million Android devices.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
HOW TO PREVENT TROJAN HORSE
1. Download apps and software from official sources.
2. Don’t open unknown email attachments or click strange links.
3. Use an ad blocker or secure browser.
4. Be skeptical of free software.
5. Don’t click web banners or unfamiliar links.
6. Use an antivirus tool.
ICT-ED INSTITUTE OF SCIENCE AN
Innovation for Quality
Education
THANK YOU!!

More Related Content

DOCX
trojon horse Seminar report
PPTX
MALWARE / VIRUS AND WORMS CHARACTERISTICS
PPTX
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
PPTX
The trojan horse virus
PPTX
Trojan Virus.pptx
PPTX
Types of Malwares, Information security.
PPTX
Torjan horse virus
PPTX
Computer virus
trojon horse Seminar report
MALWARE / VIRUS AND WORMS CHARACTERISTICS
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
The trojan horse virus
Trojan Virus.pptx
Types of Malwares, Information security.
Torjan horse virus
Computer virus

Similar to TROJAN HORSE.pptx (20)

PPT
Trojan horse nitish nagar
PPT
Trojan horse
PPTX
TROJAN HORSE ATTACK Presentation in cyber security (1).pptx
PDF
Information security
PPT
Virus (Trojan Horse,Salami Attack)
PPTX
Atul trojan horse ppt 101
PPTX
Trojan ppt pianca
PPT
Trojan Backdoors
PPTX
trojan horse- malware(virus)
PPTX
It act seminar
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
DOCX
Case study
PPSX
Ids 007 trojan horse
PPTX
Malware program by mohsin ali dahar khairpur
PPTX
PPTX
Malware ppt
PPTX
Ppt123
PPTX
Trojan horse
PPTX
Trojan horsies prez
DOCX
Introduction to trojans and backdoors
Trojan horse nitish nagar
Trojan horse
TROJAN HORSE ATTACK Presentation in cyber security (1).pptx
Information security
Virus (Trojan Horse,Salami Attack)
Atul trojan horse ppt 101
Trojan ppt pianca
Trojan Backdoors
trojan horse- malware(virus)
It act seminar
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Case study
Ids 007 trojan horse
Malware program by mohsin ali dahar khairpur
Malware ppt
Ppt123
Trojan horse
Trojan horsies prez
Introduction to trojans and backdoors
Ad

More from KristleJoyDimayuga (11)

PPTX
The-Global-Interstate-PPT.pptxxxxxxxxxxx
PDF
spanish language in foreign language 1 .
PDF
Thesis-Format-Chap-1-3.pdf
PPTX
Ambrosia-ppt.pptx
PPTX
Global-and-regional-cooperation-and-integration.pptx
PPTX
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
PPTX
Environmental-Science.pptx
PPTX
CHAPTER 6.pptx
PPTX
CHAPTER 5.pptx
PDF
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
PPTX
Real-Number-System.pptx
The-Global-Interstate-PPT.pptxxxxxxxxxxx
spanish language in foreign language 1 .
Thesis-Format-Chap-1-3.pdf
Ambrosia-ppt.pptx
Global-and-regional-cooperation-and-integration.pptx
SCIENCE_AND_TECHNOLOGY_GROUP_1_REPORT-Copy.pptx
Environmental-Science.pptx
CHAPTER 6.pptx
CHAPTER 5.pptx
CPAR-TAX-General-Principles-Batch-91-Handout.pdf
Real-Number-System.pptx
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Computing-Curriculum for Schools in Ghana
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Introduction to Building Materials
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
IGGE1 Understanding the Self1234567891011
PDF
Trump Administration's workforce development strategy
Supply Chain Operations Speaking Notes -ICLT Program
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Computing-Curriculum for Schools in Ghana
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Digestion and Absorption of Carbohydrates, Proteina and Fats
Introduction to Building Materials
Indian roads congress 037 - 2012 Flexible pavement
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
What if we spent less time fighting change, and more time building what’s rig...
Weekly quiz Compilation Jan -July 25.pdf
RMMM.pdf make it easy to upload and study
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Hazard Identification & Risk Assessment .pdf
History, Philosophy and sociology of education (1).pptx
IGGE1 Understanding the Self1234567891011
Trump Administration's workforce development strategy

TROJAN HORSE.pptx

  • 1. ICT-ED INSTITUTE OF SCIENCE AND TECHNOLOGY INC. Innovation for Quality Education
  • 2. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education TOPICS TO DISCUSS: •Introduction of Trojan Horse •How do Trojan works •Types of Trojan Horse •How to Recognize a Trojan Attack •Examples of Trojan Horse Attacks •How to prevent Trojan Horse
  • 3. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education IS A TROJAN A VIRUS OR MALWARE?
  • 4. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education WHAT IS A TROJAN HORSE? •Trojan horse is a type of malware that downloads onto a computer and disguised as a legitimate program. •Typically gets hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device.
  • 5. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education BRIEF HISTORY OF THE TROJAN HORSE •The Trojan gets its name from the Trojan Horse in the Greek epic poem The Iliad. In the story, the Greek hero Odysseus hatches a plan to construct a giant wooden horse that his enemies would receive into their city as a gift. The enemies of the city of Troy were able to get inside the city gates using a horse they pretended was a gift but within the belly of the horse hid a legion of soldiers, who emerged under cover of night to decimate the city of Troy from within.
  • 6. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW DO TROJAN WORKS? •Trojans work by masquerading as legitimate files, with the goal of tricking victims into clicking, opening, or installing them. Once this happens, the Trojan begins installing malware on your device, spying on you, or causing other types of harm.
  • 7. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 1. Backdoor Trojans: A backdoor Trojan enables an attacker to gain remote access to a computer and take control of it using a backdoor. 2. Banker Trojan: A banker Trojan is designed to target users’ banking accounts and financial information. 3. Distributed denial-of-service (DDoS) Trojans: These Trojan programs carry out attacks that overload a network with traffic. 4. Dropper or downloader Trojans: A downloader Trojan targets a computer that has already been infected by malware, then downloads and installs more malicious programs to it.
  • 8. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 5. Exploit Trojan: An exploit malware program contains code or data that takes advantage of specific vulnerabilities within an application or computer system. 6. Fake antivirus Trojan: A fake antivirus Trojan simulates the actions of legitimate antivirus software. 7. Game-thief Trojan: A game-thief Trojan is specifically designed to steal user account information from people playing online games. 8. Instant messaging (IM) Trojan: This type of Trojan targets IM services to steal users’ logins and passwords. It targets popular messaging platforms such as AOL Instant Messenger, ICQ, MSN Messenger, Skype, and Yahoo Pager.
  • 9. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 9. Info stealer Trojans: Data theft is the goal with info stealer Trojans. They’ll comb through your device for sensitive personal data, then send it back to the hacker who attacked you. 10. Mailfinder Trojan: aims to harvest and steal email addresses that have been stored on a computer. 11. Ransom Trojan: seek to impair a computer’s performance or block data on the device so that the user can no longer access or use it. 12. Remote access Trojan: Similar to a backdoor Trojan, this strand of malware gives the attacker full control of a user’s computer.
  • 10. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education MOST COMMON TYPES OF TROJAN MALWARE 13. Rootkit Trojan: is a type of malware that conceals itself on a user’s computer. 14. Short message service (SMS) Trojan: infects mobile devices and is capable of sending and intercepting text messages. 15. Spy Trojan: are designed to sit on a user’s computer and spy on their activity. 16. Sunburst: was released on numerous SolarWinds Orion Platform. Victims were compromised by trojanized versions of a legitimate SolarWinds digitally signed file named: SolarWinds.Orion.Core.BusinessLayer.dll
  • 11. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW TO RECOGNIZE A TROJAN ATTACK • Your computer feels slow. • Your computer crashes and freezes. • There are unfamiliar apps on your device. • Internet redirects. • Changes to your desktop, taskbar, or browser. • More pop-ups. • Your antivirus software is deactivated. • The best way to recognize a Trojan is to search a device using a Trojan scanner or malware-removal software.
  • 12. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education EXAMPLES OF TROJAN HORSE ATTACKS 1. Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool which enables an attacker to use a device to mine cryptocurrency to infect devices. 2. Tiny Banker: enables hackers to steal users’ financial details. It was discovered when it infected at least 20 U.S. banks. 3. Zeus or Zbot: Zeus is a toolkit that targets financial services and enables hackers to build their own Trojan malware. The source code uses techniques like form grabbing and keystroke logging to steal user credentials and financial details.
  • 13. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education EXAMPLES OF TROJAN HORSE ATTACKS 4. Emotet- First detected in 2014, Emotet began as a banking Trojan. But after cybercriminals began using it to distribute other malware instead, Emotet made serious waves in cybersecurity. 5. Shedun- Trojans aren’t just for Windows. Shedun is an Android adware Trojan horse that repackages legitimate Android apps with bogus adware, before rehosting them on third-party download portals. When you install the app from one of these sites, you get the adware along with it. By 2016, Shedun was reported to have infected over 10 million Android devices.
  • 14. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education HOW TO PREVENT TROJAN HORSE 1. Download apps and software from official sources. 2. Don’t open unknown email attachments or click strange links. 3. Use an ad blocker or secure browser. 4. Be skeptical of free software. 5. Don’t click web banners or unfamiliar links. 6. Use an antivirus tool.
  • 15. ICT-ED INSTITUTE OF SCIENCE AN Innovation for Quality Education THANK YOU!!

Editor's Notes

  • #4: Trojans are not viruses, but they are a type of malware. People sometimes refer to “Trojan viruses” or “Trojan horse viruses,” but there’s no such thing. That’s due to one critical difference in how viruses and Trojans infect victims. While viruses self-replicate, spreading from one victim to the next, Trojans need you to install them. That distinction is what distinguishes viruses from Trojan horse malware. Of course, viruses and Trojans themselves are both kinds of malware.
  • #5: disguises itself as something harmless to fool you into installing it.
  • #6: Trojan malware works the same way — it pretends to be something harmless, but it’s just a cover for its real, malicious intent. There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber attacks: The Trojan horse was a unique solution to the target’s defenses. In the original story, the attackers had laid siege to the city for 10 years and hadn’t succeeded in defeating it. The Trojan horse gave them the access they had been wanting for a decade. A Trojan virus, similarly, can be a good way to get behind an otherwise tight set of defenses. The Trojan horse appeared to be a legitimate gift. In a similar vein, a Trojan malware looks like legitimate software. The soldiers in the Trojan horse controlled the city’s defense system. With a Trojan virus, the malware takes control of your computer, potentially leaving it vulnerable to other “invaders.”
  • #7: Unlike computer viruses, a Trojan horse cannot manifest by itself, so it needs a user to download the server side of the application for it to work. This means the executable (.exe) file should be implemented and the program installed for the Trojan to attack a device’s system. 
  • #8: This enables the malicious actor to do whatever they want on the device, such as deleting files, rebooting the computer, stealing data, or uploading malware. A backdoor Trojan is frequently used to create a botnet through a network of zombie computers Banking Trojans infiltrate your devices and steal your financial login credentials. Hackers use them to crack your banking and other financial accounts. DDoS Trojans aim to conscript your device into a botnet: a network of linked devices controlled remotely by a hacker known as a bot herder. They’ll use the botnet to carry out distributed denial of service (DDoS) attacks that shut down other websites and internet services The dropper Trojan infects your device and sets the stage for the loader, which in turn installs a rootkit that gives a hacker access to your device. Other downloader Trojans will install other types of malwares.
  • #9: 5. The cyber criminal will target users through a method like a phishing attack, then use the code in the program to exploit a known vulnerability 6. fake AV Trojans pretend to detect viruses and other malware on your device, then urge you to pay for security software — which is either useless or actively malicious. When you pay, the Trojan creator gets your payment details. 7. Gaming Trojans target online gamers and steal their login info. Cybercriminals can use these to crack the accounts of high-profile players or steal valuable in-game items. 8. Targeting the instant message (IM) apps on your device, IM Trojans hijack your login credentials and help themselves to your contact list. Newer IM apps that use encryption like WhatsApp or Signal are less vulnerable than older services such as Skype or MSN Messenger — but malware is always evolving.
  • #10: 9. The components of infostealer Trojans can make it difficult for antivirus systems to discover them in scans. 10. mailfinder Trojans target email apps like Microsoft Office and plumb them for email addresses. Cybercriminals can add any plundered email addresses to their spamming or phishing attacks. 11. Ransomware is a type of malware that blocks your access to your data or device, then threatens to either publish, permanently withhold, or destroy the data unless you pay a ransom. Ransomware Trojans use deceit to trick victims into activating the ransomware. 12. The cyber criminal maintains access to the device through a remote network connection, which they use to steal information or spy on a user.
  • #11: 13. Its purpose is to stop malicious programs from being detected, which enables malware to remain active on an infected computer for a longer period. 14. SMS Trojans infect mobile devices, usually Android, and either send expensive SMS messages to premium services owned by the cybercriminal, or intercept messages coming to and from your phone. This includes sending messages to premium-rate phone numbers, which increases the costs on a user’s phone bill. 15. This includes logging their keyboard actions, taking screenshots, accessing the applications they use, and tracking login data. 16. The trojanized file is a backdoor. Once on a target machine, it remains dormant for a two-week period and will then retrieve commands that allow it to transfer, execute, perform reconnaissance, reboot and halt system services. Communication occurs over http to predetermined URI's.
  • #12: Trojans often install additional malware that together can consume a large amount of computing resources. Sometimes, Trojans may overwhelm your computer and cause crashes or other failures. The infamous Blue Screen of Death is always a cause for concern. Many Trojans install additional malware. If you notice anything unfamiliar in your Windows Task Manager or macOS Activity Monitor, look it up — it might be malware. Some Trojans change your DNS settings or manipulate your browser to redirect you to malicious sites that can harvest your data or infect you with additional malware. As the Trojan installs new malware or makes other changes to your computer, you may see new icons on your desktop or in your taskbar. The same goes for browser toolbars or plugins that you didn’t install yourself — look out for these browser hijackers. Are you seeing more pop-ups than usual? A Trojan may have installed adware on your device. Trojans and other malware don’t want to be detected and removed — so they’ll try to turn off your antivirus software.
  • #13: Zeus is known mostly as banking trojan ZeuS eventually infected millions of computers — which is why it was used to create Gameover ZeuS, one of the most notorious botnets of all time.
  • #14: 4. Routinely hailed as one of the most damaging malware strains ever created, Emotet targeted corporate and individual victims alike through massive spam and phishing campaigns. The malware was used to create several botnets, which were then rented out on a malware-as-a-service (MaaS) model to other enterprising cybercriminals. Emotet was finally disrupted in 2021 via a coordinated global law enforcement effort. 5.
  • #15: 1. Trojans are often hosted on third-party app download sites. Get your software directly from the manufacturer or from official portals like the Apple App Store and Google Play — though these have been compromised by Trojans in the past, they’re much safer than other options. 2. Fraudulent emails are a popular vector for spreading Trojans. Don’t click attachments or links in emails that you aren’t expecting to receive. Even if the email looks legit, it may be spoofed by a cybercriminal. 3. Some Trojans spread through infected web ads. An ad blocker or private browser will prevent these and other ads from loading in your browser, preventing infected sites from giving you a Trojan. 4. Trojan creators often disguise their Trojans as free games and other seemingly useful apps. If you’re about to install something new, research it first and read user reviews. 5. Not all drive-by downloads are handled via malvertising. Some malware creators develop websites that can automatically install Trojans and other malware onto your device as soon as you visit. Avoiding unknown sites reduces your risk of downloading a Trojan. 6. A strong antivirus tool from a reputable provider will automatically keep Trojans off your device. Choose one that doubles as a malware removal tool that can detect and remove Trojans and other malware from your devices as well.