Troiako zaldi

A malicious program which, apart from having an apparently useful function, also has additional hidden functions that facilitate unauthorized access to a system and render it vulnerable. They do not have self-replicating capacities and usually require the use of social engineering for propagation.

When executing a Trojan, no signals indicating malfunction are perceived. However, as the user continues to use his equipment normally, the program may open several communication channels with a remote malicious device intended to transfer control of our system to the attacker.