Skip to main content
Business owner working on a device that trojan malware is capable of infecting.

Trojan malware gets its name from the Greek trojan horse because this particular malware will attempt to pass itself off as a trustworthy piece of software in order to avoid detection. The slippery nature of this malware helps underscore why it is important for every user to have at least a working knowledge of the kinds of malware that will try to infect a small business’ network. When everyone in the company has a discerning eye for suspicious activity, then dangerous malware can be caught early, which limits the amount of time it can siphon data from your network or prevents an attack entirely. Today, we want to talk about trojan malware and its key features that you should know!

What is a Trojan?

Trojans differ from other forms of malware in that they require the user to perform specific actions in order to perform their malicious function. Once that required task is performed, then the malware can begin altering files, monitoring activity such as internet traffic or keystrokes, and siphoning off data to a hacker. Trojans are deployed in the common forms of attack hackers use such as phishing emails, but they will also be packaged into the files downloaded for third-party tools that an employee finds on a suspicious website. Once on a device, trojans will perform their functions while disguising themselves as benign software, which makes them difficult to detect.

Different Kinds of Trojans

Trojan malware sees a lot of use by malicious actors because it is a highly versatile tool. They can be crafted to act like ransomware, infect mobile devices via SMS, target extremely specific information such as financial documents, and so much more. Once disguised as a legitimate piece of software, this malware can take a user by surprise and be used to target specific online communities or businesses that the malicious actor wants to steal information from. Other disguises it can take on include:

  • Email attachments
  • Specializes industrial software
  • Zoom, and other legitimate software
  • Pirated media, such as songs or movies

Trojan Attack Strategies

Malicious actors will deploy trojan malware in a variety of different ways because of its versatility, and this is what makes it so dangerous. Some attacks are as simple as slipping the trojan into an illegal download, such as pirated music. They can also be a part of a drive-by download when a user clicks a pop-up on a malicious website or even just visits an infected website after clicking on a suspicious link in a phishing email. These are just a few of the simple attack strategies hackers will use, but trojans are also used to infect phones, tablets, and other mobile devices that users may feel safer on.


Trojan malware will disguise itself as a trustworthy program to increase its odds of infecting a device, and malicious actors are capable of tailoring their malware to target industries and find specific information they want to steal. Small businesses are often a key target for this kind of malware because a growing business will be trying new services and acquiring tools quickly, and this is why our team here at Robinett Consulting value working with small businesses so much. If you think your business needs a threat assessment and proper monitoring to root out trojan malware, then our team is waiting to provide a complimentary consultation to see if we can bring your business IT as it should be!

Robinett Consulting

Author Robinett Consulting

At Robinett Consulting, we are your consultative partner who strives to grow your business and have technology truly enabling you. We aim to understand you and your business so that you do what you do best unhindered by your IT.

More posts by Robinett Consulting