DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Cloud Computing

    A model for delivering information technology services in which ...
  2. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  3. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  4. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  5. Program Trading

    Computerized trading used primarily by institutional investors ...
  6. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
Related Articles
  1. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  2. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  3. Managing Wealth

    Is Cloud Computing An Investable Trend?

    Wall Street loves the next hot trend of cloud computing, but is it for real?
  4. Tech

    Online Banking: Your App Is Safest

    With cyber attacks becoming more frequent and sophisticated, it’s time to take steps to make your online banking experience as safe as possible.
  5. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  6. Insights

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  7. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  8. Tech

    4 Ways To Shop Safely Online

    Online shopping has become the norm but that doesn't mean it isn't risk free. Don't shop safely and you can become the next victim of a computer hack.
  9. Insights

    How to Protect Your Assets From Cyber Thieves

    Taking these precautions can keep you a step ahead of identity thieves and fraudsters.
  10. Investing

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
  3. A CFA Member or Candidate may be justified in disclosing confidential information ...

    The correct answer is: D) While acknowledging the importance of preserving confidentiality (and sensitivity of financial ... Read Answer >>
  4. Where can I find a company's annual report and its SEC filings?

    Thanks to the Internet, finding financial reports is easier than ever. Nowadays, every reputable company has an investor ... Read Answer >>
  5. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
Hot Definitions
  1. Frexit

    Frexit – short for "French exit" – is a French spinoff of the term Brexit, which emerged when the United Kingdom voted to ...
  2. Stop-Limit Order

    An order placed with a broker that combines the features of stop order with those of a limit order. A stop-limit order will ...
  3. Down Round

    A round of financing where investors purchase stock from a company at a lower valuation than the valuation placed upon the ...
  4. Keynesian Economics

    An economic theory of total spending in the economy and its effects on output and inflation. Keynesian economics was developed ...
  5. Portfolio Investment

    A holding of an asset in a portfolio. A portfolio investment is made with the expectation of earning a return on it. This ...
  6. Treynor Ratio

    A ratio developed by Jack Treynor that measures returns earned in excess of that which could have been earned on a riskless ...
Trading Center