Banker Trojan

AAA

DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

INVESTOPEDIA EXPLAINS 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. In-App Purchasing

    The purchase of goods and services from an application on a mobile ...
  2. Asset Protection

    The concept of and strategies for guarding one's wealth. Asset ...
  3. Hacktivism

    A social or political activist plan that is carried out by breaking ...
  4. Vandalism And Malicious Mischief ...

    A type of insurance coverage that protects against losses sustained ...
  5. Software As A Service - SaaS

    A cloud-computing approach to providing users with access to ...
  6. Business Software & Services Industry ...

    An exchange-traded fund (ETF) that invests in business software ...
RELATED FAQS
  1. Does technology follow the law of diminishing marginal returns?

    The law of diminishing marginal returns does sometimes apply to the technology industry. The law states that as employee ... Read Full Answer >>
  2. Who sets the global standard to stop money laundering and how is it implemented?

    The Financial Action Task Force (FATF) sets the international standard for fighting money laundering. Formed in 1989 by leaders ... Read Full Answer >>
  3. Why does fighting money laundering reduce overall crime?

    Money laundering is the process of converting funds received from illegal activities into ostensibly clean money that does ... Read Full Answer >>
  4. What is accounting fraud?

    Accounting fraud is intentional manipulation of financial statements to create a facade of a company's financial health. ... Read Full Answer >>
  5. What advice has Larry Page given to would-be entrepreneurs?

    Larry Page, the co-founder of Google, is undeniably one of the most important technology influencers in the world. Though ... Read Full Answer >>
  6. How does Tim Cook's vision for Apple differ from that of the late Steve Jobs?

    Before his death in 2011, billionaire tycoon Steve Jobs handed over control of Apple to Tim Cook, then the company's Chief ... Read Full Answer >>
Related Articles
  1. Insurance

    Identity Theft: How To Avoid It

    Don't be a victim of this disturbing crime. Get insight into how perpetrators commit this form of fraud.
  2. Stock Analysis

    How Oracle Remains A Relatively Unknown Software Giant

    Among the world's largest corporations by market cap, few companies are as unfamiliar to the everyday consumer as Redwood City, Calif.-based Oracle Corp. How is the world's second-largest software ...
  3. Entrepreneurship

    How To Protect Your Small Business From Fraud

    Small business owners are at risk of being scammed. Here's what you need to know to avoid that.
  4. Entrepreneurship

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
  5. Personal Finance

    10 Of The Most Costly Computer Viruses Of All Time

    Here's a look at some of the costliest computer viruses of all time and the damage that was caused.
  6. Personal Finance

    How To Protect Your Smartphone From Identity Theft

    A smartphone is an identity thief's dream come true because of all of the information it contains. How can you protect your smartphone data?
  7. Personal Finance

    Famous White-Hat Hackers

    Think hacking is just for teenagers or malicious identity thieves? Think again. Here are some well-known hackers that use their skills in positive ways.
  8. Personal Finance

    Most Costly Computer Hacks Of All Time

    A computer hack doesn't just cost the company money; it also hurts their brand image.
  9. Credit & Loans

    Identity Theft: Who To Call For Help

    If your identity is stolen, it's critical to act fast. Find out what to do if it happens.
  10. Personal Finance

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.

You May Also Like

Hot Definitions
  1. Venture-Capital-Backed IPO

    The selling to the public of shares in a company that has previously been funded primarily by private investors. The alternative ...
  2. Merger Arbitrage

    A hedge fund strategy in which the stocks of two merging companies are simultaneously bought and sold to create a riskless ...
  3. Market Failure

    An economic term that encompasses a situation where, in any given market, the quantity of a product demanded by consumers ...
  4. Unsystematic Risk

    Company or industry specific risk that is inherent in each investment. The amount of unsystematic risk can be reduced through ...
  5. Security Market Line - SML

    A line that graphs the systematic, or market, risk versus return of the whole market at a certain time and shows all risky ...
  6. Tangible Net Worth

    A measure of the physical worth of a company, which does not include any value derived from intangible assets such as copyrights, ...
Trading Center