Trojan Horse Awareness
Educate • Recognize • Protect

Welcome

This site raises awareness about Trojan Horse malware: what it is, how attackers use it, and how to protect yourself.

What is a Trojan Horse?

A Trojan is malicious software disguised as a legitimate program. Attackers trick users into running it; once installed, it can open backdoors, steal data, or download additional malware.

Disguised
Often bundled with legitimate apps or files.
Steals data
Targets credentials and sensitive files.
Backdoor
Allows remote control of the machine.
Secondary payloads
May download ransomware or spyware later.

How to Protect Yourself

  • Only download software from official or trusted sources.
  • Keep your OS and apps updated with security patches.
  • Use reputable antivirus and endpoint protection.
  • Be cautious with email attachments and links.
  • Limit user privileges; avoid running unknown installers as admin.
  • Back up important data regularly.

Team Members

  • Rayan Riyahi
  • Haroun Smirat
  • Sadiq
© Trojan Horse Awareness — Educational content only