Trojan horse (computing)
A Trojan horse, or Trojan, in computing is a generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the...
MP3Concept
MP3Concept is the first trojan horse for Mac OS X, created around April 2004. MP3Concept is benign, it was designed as a proof of concept regarding how a file can be disguised to an end user in a GUI ...
Alureon
Alureon (also known as TDSS) is a trojan and bootkit which is designed, amongst other things, to steal data by intercepting a system's network traffic and searching it for usernames, passwords and cre...
Zenux
Zenux is a Trojan horse, which infects Internet users' computers and steals FTP access codes.The virus functioned as follows: after infecting the user's PC, the Trojan steals all FTP access codes on t...
NetBus
NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being us...
EGABTR
EGABTR, sometimes pronounced "Eggbeater", was a Trojan horse program that achieved some level of notoriety in the late 1980s and early 1990s. Allegedly a graphics utility that would improve the qualit...
Clickbot.A
Clickbot.A is a piece of malware, an internet bot that is used for click fraud.The bot was first discovered by Swa Frantzen at SANS' Internet Storm Center in May 2006. At that time, the botnet had in...
Backdoor Shell
A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, d...
Bifrost (trojan horse)
Bifrost is a backdoor trojan horse family of more than 10 variants which can infect Windows 95 through Windows 7. Bifrost uses the typical server, server builder, and client backdoor program configura...
RavMonE.exe
RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the...
Zeus (trojan horse)
Zeus, ZeuS, or Zbot is Trojan horse computer malware that runs on versions of the Microsoft Windows. While it is capable of being used to carry out many malicious and criminal tasks, it is often used...
Zeus (trojan horse) - Wikipedia
Graybird
Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P (the most...
ClipGenie
ClipGenie is an adware program that "brings rich media content to you, directly to your hard drive. Now you can get all the best movies, games and programs downloaded directly to your computer ... whi...
Zlob trojan
The Zlob Trojan, identified by some antiviruses as Trojan.Zlob, is a Trojan horse which masquerades as a needed video codec in the form of ActiveX. It was first detected in late 2005, but only started...
OSX.RSPlug Trojan
The RSPlug Trojan horse, a form of DNSChanger, is malware targeting the Mac OS X operating system. The first incarnation of the trojan, OSX.RSPlug.A, was discovered on October 30, 2007 by the Mac secu...
Vundo
The Vundo Trojan (commonly known as Vundo, Virtumonde or Virtumondo, and sometimes referred to as MS Juan) is either a Trojan horse or a computer worm that is known to cause popups and advertising for...
Bandook
Bandook is a 2013 Bollywood crime film starring Aditya Om, Manisha Kelkar and Arshad Khan as lead characters.The film is directed and produced by Aditya Om and Mohammed M.K. Sheikh .
Depicts the ...
Bandook - Wikipedia
Optix Pro
Optix Pro is a configurable remote access tool or Trojan, similar to SubSeven or BO2KOptix Pro is far more sophisticated and lethal than its predecessors. It had the ability to kill most of the firewa...
Clampi
Clampi is a man-in-the-browser trojan that steals financial information from companies that are sent to hackers to use for fraud scams. The virus has been around since 2007 and only affects Microsoft ...
Storm Worm
The Storm Worm (dubbed so by the Finnish company F-Secure) is a backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007. The worm is also known a...
Back Orifice
Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating syst...
Agent.AWF
AWF (or Agent.AWF or Agent.btz) is a malicious Trojan downloader affecting the Microsoft Windows operating system [this being System 32].
This Trojan is considered obsolete, and there are no known...
SpySheriff
SpySheriff, also known as Brave Sentry, Pest Trap, SpyTrooper, Spywareno, and MalwareAlarm, is malware that disguises itself as an anti-spyware program. SpySheriff attempts to mislead a user int...
SpySheriff - Wikipedia
Play mp3.exe (trojan)
A Trojan horse, or Trojan, in computing is a generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the...
Onlinestability.com Trojan
Onlinestability.com Trojan or Adware.W32.ExpDwnldr is a malware trojan that uses fake pop up ads to force the infected victim to buy malicious software to repair it.
The virus tampers with the com...
Man in the Browser
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in b...
PGPCoder
PGPCoder or GPCode is a trojan that encrypts files on the infected computer and then asks for a ransom in order to release these files, a type of behavior dubbed ransomware or cryptovirology.
Once...