A financial services company discovers that an employee's computer has been transmitting sensitive client data to an external server. The IT team suspects malware is involved and has identified a process that seems to be masquerading as a valid application. Which type of malware is designed to perform unauthorized actions while disguising itself as legitimate software?
A Trojan is the correct answer because it disguises itself as legitimate software to carry out unauthorized actions, such as data exfiltration. Viruses attach to files and spread, worms replicate over networks, and ransomware encrypts data for ransom, none of which specifically disguise as legitimate programs to execute covert actions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a Trojan differ from a virus?
Open an interactive chat with Bash
What techniques do Trojans use to appear legitimate?