Trojans usually arrive in the form of an email that appears to be from a trusted source. These emails often use phishing techniques to trick recipients into opening attachments or clicking on links. Once activated, the Trojan can perform a variety of malicious activities such as spying on the user, stealing data, or even taking control of the computer.