This article was co-authored by Dan Rubianes and by wikiHow staff writer, Nicole Levine, MFA. Dan Rubianes is an IT Business Leader and the Founder and CEO of Cloudience based in Phoenix, AZ. Dan has over 25 years of experience in cybersecurity, cloud security, compliance and modernization. He is the author of the book Email Invasion and the creator of an online security course “Cybersecurity for Healthcare” on the security awareness website LearnComply.com. Cloudience provides Managed IT Services to businesses, with the promise of reducing downtime, increasing productivity, securing data, meeting regulatory compliance, and providing their clients with a competitive edge. Dan is trained as a Certified Information Systems Security Professional (CISSP) and holds certifications in Microsoft, Google, Sophos, Sonicwall, Fortinet, A+ and multiple Cybersecurity and Cloud domains.
There are 11 references cited in this article, which can be found at the bottom of the page.
This article has been fact-checked, ensuring the accuracy of any cited facts and confirming the authority of its sources.
This article has been viewed 378,765 times.
A trojan horse is a type of malware that can infect any computer. Trojans find their way onto computers by hiding in software downloads, making them easy to (unintentionally) install. You can also get a trojan horse by visiting an insecure or malicious website. Once a trojan horse is installed on your computer, it can spy on you, steal your personal information, and/or create backdoors that allow other hackers to do the same. In this article, we asked tech and cybersecurity experts for tips on identifying common signs of a trojan horse virus and how to check for and remove trojans if found. We'll also cover how to prevent trojan horse infections in the future.
Trojan Horse Viruses: What to Know
A trojan is malware that tricks you into installing it by hiding in legitimate-looking software. A trojan horse infection can expose your personal data and/or allow a hacker to access your computer remotely. Some signs of a trojan: Sudden slowness, apps you don't recognize, pop-ups, and browser redirects.
Steps
Checking For and Removing a Trojan Horse
-
Install and/or update your antivirus software. Both Windows and macOS come with built-in security software designed to keep you safe from trojan horses and other threats. However, if your computer and antivirus software are not up to date, newer trojans may creep through.
- If you're using Windows 10 or 11, Microsoft Defender is always running in the background, doing frequent scans for trojan horses and other threats.[8]
To make sure it's up to date, open the Start menu, type update, and click Check for updates in the search results. Install any updates that are found.
- Computer repair technician Spike Baron also recommends installing additional malware scanning programs like ADW Cleaner or Malwarebytes. "Between those two and Microsoft Defender, you can usually take out 99% of all viruses," he says.[9]
- If you have a Mac, virus and malware protection is built into your computer already.[10] Apple recommends keeping your system up to date to ensure the best protection. Click the Apple menu, select System Settings, click General, then click Software Update. Click Update Now if any updates are found.[11]
- If you're using Windows 10 or 11, Microsoft Defender is always running in the background, doing frequent scans for trojan horses and other threats.[8]
To make sure it's up to date, open the Start menu, type update, and click Check for updates in the search results. Install any updates that are found.
-
Scan your computer. Any reputable antivirus/antimalware software can check your computer thoroughly for trojan horses. If your software detects a trojan horse, it will let you know and then help you remove it from your computer.
- Microsoft Defender is great at tracking down and removing most threats on its own, but for a deeper scan, you can run an offline scan. In the Windows search bar, type virus, click Virus & threat protection in the search results, and then click Scan Options. Select Microsoft Defender Offline Scan and click Scan Now.
- Although you have antivirus protection, you can't run a scan on a Mac without installing non-Apple antivirus/antimalware software. One of the most well-known available is Malwarebytes for Mac, and you can use it to scan your Mac for free. Download Malwarebytes from malwarebytes.com/mac-download, and then double-click the downloaded file to install the software. Once installed, open Malwarebytes and click Scan Now to start the scan.
- There are many other antimalware programs you can use on both Windows and macOS. Malwarebytes, Avast, and AVG are all available for both operating systems, and they all have free scanning options. Each of these programs also offers you the option to pay for an upgrade that will always run in the background so it can catch trojan horses and other malware in real-time.
What's the Difference Between Malware and a Virus?
Expert Q&A
-
QuestionWhat's the best anti-virus program?
Michael Thompson-BrownMichael Thompson-Brown is a Cybersecurity Expert based in Portland, Maine. He is the owner and founder of PCRescue!, a company that provides cybersecurity and data management solutions to small businesses and individuals. Michael has over 25 years of experience in the IT industry and is a certified ethical hacker. He is passionate about helping clients protect their data and systems from malicious attacks and helping them optimize their online presence and reach. He received a Master’s degree in Cybersecurity and Information Assurance from Western Governors University, and a Bachelor’s degree in Business Administration from the University of Phoenix.
Cybersecurity Expert
The best antivirus program is often the built-in one, as it receives daily updates and runs smoothly in the background without consuming excessive resources. These built-in solutions seamlessly integrate with the operating system, ensuring efficient utilization of resources and optimal performance. -
QuestionHow do I know if my computer has malware?
Michael Thompson-BrownMichael Thompson-Brown is a Cybersecurity Expert based in Portland, Maine. He is the owner and founder of PCRescue!, a company that provides cybersecurity and data management solutions to small businesses and individuals. Michael has over 25 years of experience in the IT industry and is a certified ethical hacker. He is passionate about helping clients protect their data and systems from malicious attacks and helping them optimize their online presence and reach. He received a Master’s degree in Cybersecurity and Information Assurance from Western Governors University, and a Bachelor’s degree in Business Administration from the University of Phoenix.
Cybersecurity Expert
To determine if your computer has malware, open Task Manager by right-clicking on the taskbar and selecting "Task Manager." In Task Manager, navigate to the "Processes" tab and scan through the list for any unfamiliar or suspicious processes and applications. Look for processes with random or nonsensical names, high CPU or memory usage without any apparent reason, or processes running from unfamiliar locations on your system. These could indicate the presence of malware, and further investigation or removal may be necessary. -
QuestionI got a notification that I got a Zeus virus and I called and they said that I have a trojan and that it costs 100 dollars to fix. Is this a scam?
Community AnswerYes, this is a scam.
Video
Tips
-
If a pop-up advertisement prompts you to download anti-virus software, do not install it. This is a common trojan horse tactic. Stick to known products like those mentioned in this wikiHow.Thanks
-
If you're using an antivirus program that doesn't do regular scans in the background automatically, make sure to turn the "automatic scanning" feature (or similar) on.Thanks
Expert Interview
Thanks for reading our article! If you’d like to learn more about firewalls and viruses, check out our in-depth interview with Michael Thompson-Brown.
References
- ↑ Dan Rubianes. Tech Strategist. Expert Interview
- ↑ https://www.cyber.gov.au/glossary/trojan
- ↑ https://www.malwarebytes.com/trojan/
- ↑ Brandon Phipps. Technology Specialist. Expert Interview
- ↑ Michael Thompson-Brown. Cybersecurity Expert. Expert Interview
- ↑ https://www.cyber.gov.au/threats/types-threats/malware
- ↑ https://www.mcafee.com/learn/understanding-trojan-viruses-and-how-to-get-rid-of-them/
- ↑ https://support.microsoft.com/en-us/windows/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963
- ↑ Spike Baron. Computer Repair Technician. Expert Interview
About This Article
1. Update your operating system and antivirus software.
2. Run an antivirus scan.
3. Keep all of your software up-to-date in the future and avoid downloading applications from unknown sources.







