Trojan horses have no
replicating abilities like viruses or worms
They’re malicious code and programs that
Masquerade as legitimate applications or are embedded in real programs
Trojans install
Back doors
Trojans can disguise as
Games Utilities & tools Device drivers Patches and updates Free shareware System upgrades
What’s (RATs)
Remote access Trojans
RATs create
Back doors
To establish command and control communications with a back end server.
Well known RATs include GHOST PLUGX SAKULA
Now on mobile phones