targeted Trojan horse
n. A Trojan horse program sent as an attachment in an email message that has a subject line, body text, and return address that have been crafted to fool the recipient into opening the attachment.
Also Seen As
Examples
2005
Banks, too, need to put in similar monitoring systems to score every single activity for risk, particularly at a time when phishing, pharming and targeted Trojan attacks are becoming more common, he says.
—Jaikumar Vijayan, “Banks urged to look at stronger security,” Computerworld, November 07, 2005
2005
The Trojan horse attack, in which an e-mailed attachment — like the Trojan horse of Greek myth — looks innocuous but conceals a dangerous cargo, has been an all-too-familiar part of the computer landscape for decades. In recent years, however, a new and ever more prominent feature in that landscape has been the targeted Trojan, in which the e-mail subject line or message contains language calculated to lure a particular recipient into opening the attachment. Increasingly, targeted Trojan horses are being used to steal proprietary information, obtain intelligence to get an edge on rivals, and even, it seems, obtain access to sensitive military data.
—Lauren Aaronson, “For Love of Money,” IEEE Spectrum, November 01, 2005
2004 (earliest)
Before you run to the data center to unplug your mail server, let me assure you there are ways to fight targeted Trojan spoofing.
—Jonathan Feldman, “The IT Agenda: Battling Targeted Trojan Spoofing,” Network Computer, July 22, 2004
Notes
A Trojan horse is a seemingly benign program that contains malicious code designed to steal or destroy data.