like its namesake, Trojan horse attacks, or simply “Trojans” use deception to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.
Think of Trojans as an umbrella term for malware delivery, because there are various kinds of Trojans. Depending on the criminal programmer’s intent, a Trojan can be like a Swiss Army knife of hacking—acting as a bit of standalone malware, or as a tool for other activities, such as delivering future payloads, communicating with the hacker at a later time, or opening up the system to attacks just as the Greek soldiers did from inside the Trojan fortress.