A Trojan horse is a type of malware hidden within an apparently harmless file or program. Once the victim downloads and installs a Trojan, malicious software executes its true purpose (e.g., set up a back door, monitor computer activity, redirect traffic, export or damage data, etc.). Criminals typically hide Trojans within innocent-looking email attachments and online files.