Kit
📹 Join the wait list
Published: February 3, 2026
Video Description
FULL SECURITY+ IN 31 DAYS COURSE
📹 Join the wait list - https://certbros.kit.com/01730e35f7
BOSON PRACTICE EXAMS
✔ Best practice exams - https://www.certbros.com/security-plus/exsim
HAVE A QUESTION?
💬 Discord - https://www.certbros.com/discord
Disclaimer: Some of these are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.
---------------------------------------------------------------------------------------------------------------
In this video, we’re going to explore how Trojans work, what makes them so deceptive, and the different types you might come across in the real world.
What Is a Trojan?
The name comes from the myth of the Trojan Horse. In that story, the Greeks gifted a giant wooden horse to the city of Troy, pretending it was a peace offering. But inside the horse were hidden soldiers who later attacked the city from within.
A computer Trojan works the same way. It’s a type of malware that pretends to be a legitimate program or file. Once it’s installed, it can carry out all sorts of malicious actions behind the scenes, often while continuing to look and act like a normal app.
How Trojans Spread
Trojans rely on social engineering. They don’t spread by themselves like worms or viruses. Instead, they need the user to download or run them. That could be:
- A fake software update
- A pirated game
- A suspicious email attachment
- A tool or app that looks useful but hides malicious code
Once the user runs it, the damage begins.
Types of Trojans
There are many kinds of Trojans, each with different goals. Here are some of the most common:
Remote Access Trojans (RATs)
These give the attacker full control of your computer. They can browse your files, log keystrokes, access your webcam, and more.
Attackers often use legitimate remote access tools like TeamViewer or AnyDesk to stay hidden.
Downloader Trojans
These Trojans don’t do much on their own. Their job is to download and install more malware once they get into your system.
That could include ransomware, spyware, or other Trojans.
Keylogger Trojans
These silently record everything you type, including passwords, messages, and credit card numbers.
The captured data is then sent back to the attacker.
Banking Trojans
These are designed to steal your online banking credentials.
They might monitor your browser, alter banking websites, or capture what you type.
Their goal is to perform unauthorised transactions from your account.
Fake Antivirus Trojans (Fake AV)
These look like legitimate antivirus software. They warn you about fake threats on your system and ask you to pay for a “premium” version to remove them.
Once you pay, your money and personal info go straight to the attacker.
Trojans are dangerous because they don’t force their way in — they wait to be invited. They rely on trust, deception, and curiosity.
By knowing how they work and what they look like, you’ll be better prepared to avoid falling for one.