• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is Secure Access Service Edge (SASE)
      • What is Security Service Edge (SSE)
      • What is a Cloud Access Security Broker (CASB)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

Trojan? You mean like the Malware?

Author avatar of Vinny LaRizaVinny LaRiza
Updated — March 5, 2020 • 3 minute read
View blog >

Welcome back, ladies and gents, to another installment of MalWTF101! Last month, I picked apart what a BotNet is (here’s a link for convenience). This week, I’m going to talk about one of the more classic trolls of the malware neighborhood. This particular style of malware has been around since about the 1980s and is still relevant to this day, as the trolls continue to find ways to trick you into downloading and enabling it on your computer. If you guessed “Trojan”, well then you are correct—we’re going to talk about the Trojan.

Troll-Horse

Unless you’ve been living under that rock, you’ve likely heard the story of the Trojan Horse, which is where the name of this malware was pulled from. Essentially, the Greeks built a giant wooden horse as a trophy to the Trojan army for “winning” the war. Little did those arrogant Trojans know, there was a gang of bruisers hanging out inside that giant wooden statue.

trap

As you can probably guess, those hidden soldiers eventually broke out and sacked the City of Troy, thus conquering the city, winning the war and eventually having a common type of malware named after the event.

Trojan malware? Pretty much the same as it is in the story. A file that looks legit so you think it’s legit but IT’S NOT LEGIT! You allow it to enter your City of Troy (a.k.a. computer) where, once executed, it’s free to vandalize whatever part of your computer it was sent out to vandalize. Everything from crashing your computer, keystroke logging (where everything that you type is recorded), using your webcam to look at your face or other things, controlling your computer remotely, using your computer as a proxy for illegal activities and attacks on other computers so you look responsible, deleting and/or altering files, downloading and installing third-party malware, watching your screen from their computer while you use it, activating that damn blue screen of death, making you sad, making you angry, making you confused, etc. All possible by way of the Trojan.

According to the AWGP Trend Reports White Paper for Q1 2014, they state that “Trojans continue to be the most common type of malware, constituting 71.85% of all malware captured during this quarter. PandaLabs’ Collective Intelligence platform found that that almost four out of every five malware infections were caused by Trojans (79.70%).”

Trojans come packaged in a lot of different forms of executables as well—they’re not just limited to vbs and exe files, although those seem to be the most prominent. They can also be pdf, mp3, mov, jpg, txt… you get the idea. Basically any type of desirable file can be a trojan, which makes them particularly annoying and shitty.

Some good news out of all of this? Umbrella protects against Trojans. Lots of ’em. Zeus, Ramnit, Android/Gumen, Flame, Renos, FakeAV, I really could go on for a long time. We also, once again, provide you with the tools to pinpoint which computer (or computers) on your network are hosting the source of the activity, should you already be infected with one of these things.

So that’s what a Trojan is! Make sense? I sure hope so. If not, you could take it one step further and watch that movie Troy. It’s based around that whole Trojan Horse story and includes Brad Pitt as a demigod who runs around, sword in hand, unconvincingly jump stabbing dudes that are like 3 times his size.

troypitt

You could also apply to join the OpenDNS Labs Security Community, which focuses specifically on potentially malicious domains that have been submitted for review (including those related to Trojans) by the community, and in turn helps to protect the millions of OpenDNS users around the world.

Suggested Blogs

  • Cisco Umbrella Delivered Better Cybersecurity and 231% ROI February 21, 2023 2 minute read
  • Cisco Listed as a Representative Vendor in Gartner® Market Guide for Single-Vendor SASE January 26, 2023 3 minute read
  • How to Evaluate SSE Vendors: Questions to Ask, Pitfalls to Avoid June 23, 2022 5 minute read

Share this blog

FacebookTweetLinkedIn

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella