Tag

Trojan Horse Malware

Focused guidance on understanding Trojan horse malware, including how these deceptive programs infiltrate systems disguised as legitimate software. Posts cover common Trojan variants, infection vectors, detection techniques, and removal procedures to keep devices and networks secure.

posts

Trojan Horse Malware

Trojan Horse Malware: What It Really Does to You

In 2023, the FBI's Internet Crime Complaint Center received over 880,000 complaints with losses exceeding $12.5 billion — and a staggering number of those incidents started with a single file that looked perfectly legitimate. That file was trojan horse malware, disguised as an invoice, a software update,

Carl B. Johnson Apr 01, 2026 5 min read
Trojan Horse Malware

Trojan Horse Malware: What It Is and How to Stop It

In July 2021, the REvil ransomware gang exploited a vulnerability in Kaseya's VSA software and dropped a trojan payload onto the systems of roughly 1,500 businesses worldwide. The attack didn't arrive as an obvious virus. It masqueraded as a legitimate software update — the textbook definition

Carl B. Johnson Sep 03, 2021 7 min read
Trojan Horse Malware

Trojan Horse Malware: How It Gets In and How to Stop It

The Fake Invoice That Cost a Hospital $28 Million In 2024, Ascension Healthcare disclosed a ransomware attack that disrupted operations at 140 hospitals across 19 states. The initial entry point? An employee opened what appeared to be a routine file. It was trojan horse malware — a malicious payload disguised as

Carl B. Johnson May 08, 2020 7 min read
Trojan Horse Malware

Trojan Horse Malware: How It Gets In and How to Stop It

The Fake Invoice That Cost a Hospital System $28 Million In 2024, Ascension Health — one of the largest healthcare systems in the United States — suffered a devastating ransomware attack that disrupted operations across 140 hospitals. The initial entry vector? A malicious file that an employee downloaded, believing it to be

Carl B. Johnson Jul 14, 2019 7 min read