Ora

Why Is Trojan Called Trojan?

Published in Malware Naming 4 mins read

The term "Trojan," particularly in the context of computing, is directly derived from the famous ancient Greek story of the deceptive Trojan Horse that ultimately led to the fall of the city of Troy. This name perfectly encapsulates the way this type of malicious software operates by misleading users about its true intent.

The Mythological Origin

The naming convention stems from one of the most iconic tales in Greek mythology, prominently featured in Virgil's Aeneid. After a decade of siege, the Achaeans (Greeks) pretended to give up and sailed away, leaving behind a giant wooden horse as an apparent offering to the goddess Athena.

The Trojans, believing the war was over and the horse was a gift, brought it inside their city walls despite warnings. Unbeknownst to them, select Greek soldiers were hidden inside the hollow structure. Under the cover of darkness, these soldiers emerged, opened the city gates for the returning Greek army, leading to Troy's capture and destruction.

For a deeper dive into the myth, you can explore the Trojan Horse story on Wikipedia.

The Computing Analogy

In the digital world, a Trojan horse (or simply Trojan) is a type of malware that mimics this ancient deception. It disguises itself as a legitimate, desirable, or harmless program or file to trick users into installing and running it. Once executed, the Trojan performs malicious actions without the user's knowledge, much like the hidden Greek soldiers.

You can learn more about this type of cyber threat on the Trojan horse (computing) Wikipedia page.

Parallels Between Myth and Malware

The parallels between the ancient tale and modern cyber threats are striking and clearly illustrate why the name "Trojan" was chosen:

Feature Mythological Trojan Horse Computer Trojan Horse
Appearance A gift, a sign of surrender, a beautiful wooden structure A legitimate application, a useful utility, an interesting file
True Intent Conceals enemy soldiers waiting to attack Hides malicious code designed to harm your system or data
Entry Method Welcomed inside the city walls by the unsuspecting Trojans Executed by the unsuspecting user onto their computer
Outcome Led to the fall of Troy and its destruction Can lead to data theft, system damage, or loss of control

What Can a Computer Trojan Do?

Once a Trojan successfully infiltrates a system, it can perform a wide range of harmful activities, including:

  • Creating Backdoors: Allowing remote access to the infected computer for other malicious activities.
  • Data Theft: Stealing sensitive information like passwords, credit card numbers, or personal files.
  • Spying: Monitoring user activities, taking screenshots, or recording keystrokes (keyloggers).
  • Launching Other Attacks: Downloading and installing additional malware, such as viruses or ransomware.
  • Botnet Participation: Turning the infected computer into a "bot" to be controlled remotely as part of a larger network for DDoS attacks or spam campaigns.
  • Financial Fraud: Modifying online banking transactions or redirecting users to fake websites.

Protecting Against Trojans

Safeguarding your systems from Trojan attacks requires vigilance and robust security practices:

  • Be Cautious with Downloads: Only download software from reputable and trusted sources. Avoid suspicious attachments in emails or links from unknown senders.
  • Use Antivirus/Anti-Malware Software: Install and keep updated a comprehensive security suite that can detect and remove Trojans.
  • Enable a Firewall: A firewall can prevent unauthorized access to your computer and block malicious outgoing connections.
  • Keep Software Updated: Regularly update your operating system, web browser, and all applications to patch security vulnerabilities that Trojans might exploit.
  • Backup Your Data: Regularly back up important files to an external drive or cloud service, so you can recover them in case of an infection.
  • Exercise Common Sense: If something seems too good to be true (e.g., a free offer that requires unusual permissions), it often is.