What is a Trojan downloader?

A Trojan downloader is a type of Trojan horse that downloads and installs files, often malicious programs. A Trojan horse is a type of software that looks legitimate but can be malicious in nature. Sometimes these programs can be downloaded onto a device without the user’s knowledge or consent. A Trojan’s purpose is to damage, disrupt, steal, or generally inflict some other harm on your computer and devices.

How does a Trojan downloader work? 

In order for a Trojan horse to spread, it must first be downloaded onto your computer. This can happen when you open an email attachment containing an infected file, or through an exploit kit. This creates what is called a back door, where the trojan downloader can download and install new versions of malicious programs, including more Trojans and adware, for example. The back door can also provide access to a system, and any confidential or personal information may be compromised.

How to help protect your devices against a Trojan downloader

  • Install and run an internet security suite. Run periodic diagnostic scans with your software.
  • Update your operating system and software programs as soon as updates and patches are made available from the manufacturer. Cybercriminals tend to exploit security holes and flaws in outdated software programs and operating systems.
  • Back up your files regularly. If a Trojan downloader infects your computer, this will help you to restore your data.
  • Don’t visit unsafe websites. To determine if you are on a secure website, look for a padlock in your URL bar near the web address, and make sure the website begins with HTTPS. If you are running a quality internet security software, it should alert you that you’re about to visit an unsafe site.
  • Don’t open a link or click on an attachment in an email unless you’re confident it comes from a legitimate source. In general, avoid opening unsolicited emails from senders you don’t know. To help stay safe, run a security scan on any email attachments before opening them.

All-in-one protection. All for one low price.

Security for your devices, your online privacy, and your identity. NortonTM 360 with LifeLockTM

Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.

Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.