Trojan Horses
Trojan horses, which are attached to other programs, are the leading cause of all break-ins, When a user downloads and activates a Trojan horse, the software can take the full control over the system, and you can remotely control the whole system… Great..!!! They are also referred as RATs (Remote Administration tools - see also RSATs).
Fortinet explained: Trojan Horse and Malware