Search
Close this search box.

A Trojan Horse is ‘Neigh’ Joke – Here’s Why

Table of Contents

[fusion_builder_container type=”flex” hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” border_sizes_top=”” border_sizes_bottom=”” border_sizes_left=”” border_sizes_right=”” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_transform=”none” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]The trojan horse achieved its fame because of the Trojan war of Greek Mythology.

As the story goes, the Greeks presented a giant wooden horse as a gift to the Trojans, who allowed the wooden horse into their walled city. Once inside the walls, the Greeks jumped out of the horse and attacked the city of Troy. A tactical, calculated method of attack.

This is where trojan horse malware gets its name. The user unknowingly allows the ‘trojan horse’ onto their device which, at the time, looks like a genuine file or application such as an MP3 music file or a Word document.

Hackers can then use the trojan horse as a means to access to the personal data stored on the victim’s device.

Trojan horse malware is not a virus. This is an important point to make.

Unlike a virus, a trojan horse cannot replicate itself and this malware can only work with the interaction from the victim. Therefore, criminals conceal this type of malware within common file types.

How does a trojan horse work?

Fake files, messages, or applications are sent to you by the cyber criminal. If you then click on the file, it gives the cyber criminal access to your device and the means to do what they want with your data.

Highly important data such as credit cards, passport details and addresses could be stolen if the correct protection is not in place.

Back in 2000, there was a famous of trojan horse malware in circulation called ‘ILOVEYOU’. This was the subject of the email that was sent out to every email address that had an account with Microsoft Outlook. This caused financial damages of an estimated £6.9 billion with around 45 million Windows PCs hit.

How do I identify a trojan horse?

This attack is normally targeted towards small businesses with less capable cyber security systems because they don’t have enough protection or advanced technical knowledge to cope with an attack.

Trojan horse malware can attack all types of devices, including mobile phones through SMS scams. Furthermore, applications have been developed which are not secure and can infect mobiles with unwanted malware.

Trojan malware is designed to harvest confidential data. Hackers will try and gain as much data as they possibly can for their own benefit. They are most likely to sell it on, usually on the dark web, to make a lot of money.

Alternatively, they could use your own data to hold you to ransom.

How to protect yourself from a trojan horse

If there is one thing you can take away from this, it is that prevention is always better than cure.

There are many ways you can protect yourself and your business from being victim of a trojan horse attack:

  • Layer your defences with email, endpoint, and network security;
  • Don’t visit unsafe websites;
  • Be wary of email links and only install trusted software;
  • Keep up with regular system and device updates; and
  • Complete regular backups of your information

It is important to remember these tips.

Along with this advice comes with a bit of common sense. If something doesn’t quite look legitimate and you have concerns about what an email might contain then don’t click on it. Martin, our MD, just recently wrote about something very similar.

To make sure that the email/network security for your business is safe and secure from cyber attacks or you want advice on cyber security contact us at hello@neuways.com or on 01283753333.[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

Want to keep up with our blog?

Get our most valuable tips right inside your inbox, once per month!

Latest IT News & Insights
Work Password Example - why you need a password manager
The most hacked passwords in 2024 and how to protect yourself
These are the most hacked passwords in 2024, learn today how you can protect your business and foster...
Read More
Early patching in Cyber Security
The Importance of Early Patching
Combat against cyber threats with early patching in cyber security.
Read More
Zero Patch updates - Cyber security vulnerability spotted - Neuways urge businesses to act.
Biggest Microsoft Patch Tuesday in years fixes four zero-days, five critical bugs
Discover how the latest Microsoft Patch Tuesday update addresses 142 vulnerabilities, including four...
Read More
Cyber security offered by Neuways in Derby
Businesses pressing ahead with AI regardless of Concerns
Businesses are ignoring concerns re: AI for data tracking. Neuways advise on how to foster a cyber security...
Read More
Cybersafe
What is Credential Stuffing and how can it affect your business?
Defend your business against credential stuffing attacks thanks to Managed Cyber Security services from...
Read More
Cyber secure culture within the business
6 ways to foster a Cyber Secure culture within your company
95% of cyber security issues traced to human error. Here is how to foster a cyber secure culture within...
Read More
Apple devices holding company data could be a security flaw in your business. Photo by Aurich Lawson.
Why it's important to control what apps go into devices that hold company data
If you supply employees with work devices holding company data, managers need to be able to control what...
Read More
Beware of Fake Free WiFi netowrks.
Beware of Fake Free WiFi Networks
Fake free WiFi networks allow cyber criminals to gain access and steal personal data. Use a secure WiFi...
Read More

Frequently Asked Questions

As a leading IT and technology provider, we offer three core services, all of which have additional add-ons. We offer Managed IT Support, Business Central implementation and consultation, as well as Managed Cyber Security. Call us on 01283 753333 if you are interested in any of our services.

Contact us

Support: 01283 753300

Business Development: 01283 753333

Purchasing: 01283 753322

Admin and Accounts: 01283 753311

Email: hello@neuways.com

Managed IT support is a comprehensive solution where an expert IT provider, like Neuways, handles your technology infrastructure. This includes proactive monitoring, maintenance, cyber security, and support.

Yes we do. Your business needs Cyber Security due to the increasing number of cyber threats that are affecting businesses in all industries. If your business has data and technology systems implemented, you will need Managed Cyber Security.

We can help you conduct Cyber Audits to assess whether your business would gain Cyber Essentials and Cyber Essentials Plus Certification. Our dedicated departments work with your team to assess how much work is required before you gain Cyber Essentials Plus certification. We will then provide advice and consultation on what aspects you need to change within your business before providing a quote on how we can assist your company become Cybersafe.

Yes we can. We have our own dedicated Microsoft Dynamics 365 Business Central teams who work to ensure that we can implement the right systems and solutions into your website that are absolute right for you. Our experienced business consultants have worked all over the world for organisations operating on a global scale. 

Exclaimer Pro is a dynamic email signature that helps clients to switch and change around email signatures so that clients are able to advertise different offers and brands to a variety of email recipients. Administrators can also manage user emails internally, meaning the user does not have to touch their own email signature.

We offer Managed Security Training to help employees spot email phishing attacks, spear phishing attacks and vishing attacks. We also help train clients on how to use the various pieces of software we provide to clients, like Exclaimer Pro, Business Central and Cybersafe software.

We are a Managed IT Support provider based in Derby, East Midlands. However, we cover so many areas including the whole of the UK, Europe, and America. We are always willing to travel and send our expert technicians to ensure you have the best experience. 

Got a question?

Reach out
& Connect

Please enable JavaScript in your browser to complete this form.
Name