Skip to main content
Category: Strategies
Type: Competitive Strategy
Origin: Greek Mythology, Trojan War (c. 1200 BCE), Homer’s Iliad
Also known as: Trojan Horse Marketing, Infiltration Strategy, Gift-Based Entry
Quick Answer — Trojan Horse Strategy is a method of gaining access to a protected market, organization, or customer base by offering something of apparent value that conceals a deeper strategic objective. Originating from the legendary Greek stratagem during the Trojan War, this approach has evolved into a powerful business tool where companies enter markets through low-friction, value-first offers before revealing their true scale or intentions.

What is Trojan Horse Strategy?

Trojan Horse Strategy operates on a powerful psychological principle: humans are naturally suspicious of direct threats but welcoming of gifts. Rather than attacking defenses head-on, this strategy disguises one’s true intentions behind an offering that appears beneficial, harmless, or even sacred. The target, eager to accept what seems like a victory or gift, inadvertently brings the threat inside their protective walls.
“The Trojan Horse is the ultimate example of turning an opponent’s desires into their destruction. They wanted peace—and peace is what they got, just not the peace they imagined.” — Robert Greene, The 33 Strategies of War
The strategy requires patience and the willingness to delay apparent success. In business, this manifests as companies offering valuable free tools, content, or services that establish trust and access—only later revealing that these were merely the vehicle for entering a market where they will compete with or displace existing players.

Trojan Horse Strategy in 3 Depths

  • Beginner: A salesperson uses the “foot-in-the-door” technique—asking for a small commitment (like a survey response) that makes the target more receptive to a larger request later. The initial ask is the “gift” that opens the door.
  • Practitioner: A tech company offers free developer tools or APIs that attract a community of users. Once developers build products dependent on these tools, the company reveals its commercial ambitions—much to the surprise of those already invested.
  • Advanced: A foreign company enters a protected market by partnering with local businesses, fulfilling regulatory requirements, and building goodwill—only to gradually expand operations until it becomes the dominant player, having already secured trust and market access.

Origin

The Trojan Horse originates from Greek mythology, specifically the events concluding the Trojan War. After ten years of siege, the Greek army—unable to breach the formidable walls of Troy—devised a cunning plan. They constructed a massive wooden horse, hollow inside, and filled it with elite soldiers. Pretending to abandon the siege, the Greeks sailed away, leaving the horse as an apparent offering to the gods. The Trojans, believing they had won, dragged the horse inside their walls despite warnings from the prophet Cassandra and the priest Laocoön. That night, while Troy celebrated, Greek soldiers emerged from the horse, opened the city gates, and allowed the returning Greek army to sack the city. The principle has been codified in military doctrine ever since. Sun Tzu wrote in The Art of War: “All warfare is based on deception.” The Trojan Horse represents the highest form of this principle—not just deceiving about intentions, but transforming a symbol of victory (the horse as a sacred offering) into an instrument of destruction.

Key Points

1

Offer Genuine Initial Value

The Trojan Horse only works when the initial offering has real value. Free tools, content, or services must be genuinely useful to build trust. The deception lies in what comes next, not in the worthlessness of the entry point.
2

Mask True Scale and Intent

Enter the market appearing smaller, friendlier, or less ambitious than you ultimately are. The goal is to be welcomed inside before your true position becomes apparent. Aggressive positioning too early triggers defensive reactions.
3

Build Dependency Before Reveal

The strategic moment arrives when the target becomes dependent on your offering—whether through data, integration, habit, or installed base. By then, removing you would be costly or impossible.
4

Move Fast After Entry

Once inside, move quickly to establish your position before the target can react. The advantage of the Trojan Horse diminishes with time as the deception becomes apparent.

Applications

Tech Market Entry

Companies like Google (Android), Facebook (open protocols), and countless SaaS startups have used free tools to gain market access. Users adopted the tools, built businesses around them, and suddenly found themselves dependent on platforms with commercial interests.

Retail Expansion

Warehouse clubs like Costco or Sam’s Club offer membership savings that attract price-sensitive shoppers. Over time, the relationship shifts from “savings vehicle” to “primary shopping destination,” capturing the customer’s entire retail relationship.

Content Marketing

Brands create valuable free content—blogs, videos, webinars—that establishes thought leadership. Readers consume the content, trust builds, and eventually, products or services feel like natural extensions rather than foreign sales pitches.

Strategic Partnerships

Companies enter new geographies through joint ventures with local partners. The partnership provides legitimacy and market access; the eventual expansion leverages that foundation to establish direct operations.

Case Study

Amazon’s entry strategy in India exemplifies the modern Trojan Horse. When Amazon launched in India in 2013, it faced strict foreign investment regulations and deeply entrenched local competitors like Flipkart. Rather than launching a full-scale assault, Amazon employed a Trojan Horse approach. Amazon offered Indian sellers access to its global marketplace, powerful logistics infrastructure, and cloud services—all seemingly helpful tools for growing their businesses. Indian sellers, many of whom struggled with infrastructure, eagerly adopted Amazon’s ecosystem. Small retailers saw Amazon as a helpful platform partner, not a competitive threat. By the time sellers realized they had built their businesses on Amazon’s infrastructure—making switching costs prohibitively high—Amazon had captured a dominant market position. The “helpful partner” had become the platform kingmaker. According to Euromonitor data, Amazon India captured over 35% of online retail market share by 2020, largely by having already established the infrastructure that made competing impossible.

Boundaries and Failure Modes

The Trojan Horse fails when the initial gift is perceived as insincere or when the target maintains sufficient警惕 (vigilance). If competitors or customers sense an aggressive hidden agenda before dependency builds, they may reject the offering entirely. Additionally, if the initial value proposition is weak, the target won’t accept the “gift” in the first place. Ethical concerns arise when the eventual reveal causes harm to those who trusted the initial offering. The line between strategic sequencing and deception depends on whether the long-term relationship delivers genuine value—or exploits the trust established at entry.

Common Misconceptions

Correction: The Trojan Horse is not fraud—it’s strategic sequencing. The initial offering must have genuine value. The strategy exploits trust, not the absence of it. Unethical applications that deliver no real value collapse when revealed.
Correction: The strategy can be repeated, but each use requires a genuinely valuable entry offering. Markets become more skeptical over time, but the principle remains effective when authentic value precedes commercial ambition.
Correction: While prominent in tech, the strategy appears across industries. Pharmaceutical companies offer free research tools to hospitals. Financial firms provide free accounting software to small businesses. The principle predates digital technology by millennia.
Trojan Horse Strategy connects to other approaches that leverage psychology and strategic sequencing.

Loss Leader

Offering below-cost products to attract customers who then purchase other items at higher margins.

Platform Strategy

Building ecosystems that create network effects and switching costs.

Signaling

Communicating strategic intent (or lack thereof) to shape competitor behavior.

One-Line Takeaway

Don’t knock on the door—send a gift. Once you’re inside, you can open it for everyone else.