GLOSSARY / Trojan Horse
What is Trojan Horse?
Malware disguised as legitimate software to trick users into running it.
Named after the Greek myth, a trojan hides malicious functionality inside something that looks useful. Once executed it can install backdoors, steal data, or download more malware.
Unlike worms, trojans do not self-replicate — they rely on the user being deceived.
Related free tools
Related terms
Part of the Ciphers Security glossary. Free reference for analysts, defenders & learners.