Are you familiar with the different types of trojans? A trojan is a form of malware that uses deception to carry out its malicious activities. It typically hides in legitimate programs while waiting for the right time to strike. There are different types of trojans, however, some of the most common of which are listed below.

#1) Banking Trojans

Banking trojans are designed to steal the login credentials of online banking customers. Most of them use keyloggers. If you download a banking trojan, it will conceal itself on your computer while logging your keystrokes. The next time you log in to your bank account, the banking trojan will capture your login credentials.

#2) Backdoor Trojans

Backdoor trojans are designed to bypass the cybersecurity defenses of a computer or network. When deployed, they will create a backdoor for the attacker. The attacker will then be able to breach the computer or network. Backdoor trojans are used to carry out remote attacks against computers and networks.

#3) DDoS Trojans

DDoS trojans, as you may have guessed, are used to conduct distributed denial-of-service (DDoS) attacks. They don’t actually conduct DDoS attacks against the computers which they infect. Rather, DDoS Trojans are designed to hijack computers for use in DDoS attacks. If your computer is infected with a DDoS trojan, it will become part of a botnet — and this botnet will be used to conduct a DDoS attack.

#4) Form-Grabber Trojans

There are also form-grabber trojans. They are characterized by their ability to capture or “grab” data from the completed forms. When you enter data in an online form, a form-grabber trojan may steal it. Form-grabber trojans are typically spread through email attachments, file downloads or by clicking on malicious website links.

#5) Adware Trojans

If you notice pop-up ads that are difficult or impossible to close, your computer may be infected with an adware trojan. Adware trojans are used to serve adware to unsuspecting users. The pop-up ads may appear only when you are browsing the internet, or they may appear anytime your computer is connected to the internet — regardless of whether your web browser is open.

#6) Rootkit Trojans

Some trojans leverage rootkit malware. These trojans are designed to provide the attacker with privileged access to a computer or network. Rootkit trojans are highly concerning. When left unaddressed, the attacker will have free reign to steal data and perform other malicious activities.