Trojan.

Short bio

Trojan is a category of Malwarebytes’ detections that applies to various types of malware that hide their true intentions and then exploit systems once they are inside. To learn more about Trojans, read our related blog content.

Type and source of infection

Common infection methods for Trojans include:

Downloading cracked applications or keygens
Downloading unknown free programs (games, screensavers, and simple, entertainment-related applications)
Opening infected attachments and macros
Opening an image or other type of file that is in reality an executable with a changed extension
Visiting websites that have been compromised or set up to infect users. This can also be a result of third-party content such as malvertising

Protection

Malwarebytes protects users from Trojan infections by using real-time protection, by blocking the malicious macros from executing, and by blocking the malicious IPs/Domains.

Remediation

Usually Malwarebytes can detect and remove trojans without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that All Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language