👤

A trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system.