%0 Journal Article %T Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware %A £¿lker Kara %J - %D 2019 %X As the use of technological devices increases, malicious people develop and spread new types of malicious software every day in order to harm these devices and their users. Although security measures are taken against these widespread threats affecting individuals and institutions, the vulnerabilities continue to exist. Many of the cyberattackers uses malware to attack by exploiting existing security vulnerabilities. Trojans are extremely dangerous kind of malicious software that infiltrates the victim system by hiding themselves inside a seemingly harmless file extension. The Remote Access Trojan Horse, however, provides remote access to the attacker after infecting the victim system. In this way, the attacker can access the files and passwords in the system, and convert the victim system into a slave system that can perform regular, coordinated attacks. In this study, it is aimed to define Remote Access Trojans, to explain their methods of infiltration into the victim system and the measures that can be taken against this threat and to raise user awareness. %K Siber tehdit %K zararl£¿ yaz£¿l£¿mlar %K uzaktan eri£¿im truva atlar£¿ %U http://dergipark.org.tr/by/issue/45460/542743