Once inside, the "gates" are opened, allowing the malware to steal data, spy on users, or install even more dangerous software like ransomware. How a Trojan Infects Your Device
Hackers exploit holes in old software. Regular updates patch those holes.
Modern security suites can flag a Trojan download before you even open the file.