Banker Trojan


DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 


  1. In-App Purchasing

    The purchase of goods and services from an application on a mobile ...
  2. Asset Protection

    The concept of and strategies for guarding one's wealth. Asset ...
  3. Hacktivism

    A social or political activist plan that is carried out by breaking ...
  4. Vandalism And Malicious Mischief ...

    A type of insurance coverage that protects against losses sustained ...
  5. Software As A Service - SaaS

    A cloud-computing approach to providing users with access to ...
  6. Business Software & Services Industry ...

    An exchange-traded fund (ETF) that invests in business software ...
Related Articles
  1. Insurance

    Identity Theft: How To Avoid It

    Don't be a victim of this disturbing crime. Get insight into how perpetrators commit this form of fraud.
  2. Stock Analysis

    How Oracle Remains A Relatively Unknown Software Giant

    Among the world's largest corporations by market cap, few companies are as unfamiliar to the everyday consumer as Redwood City, Calif.-based Oracle Corp. How is the world's second-largest software ...
  3. Entrepreneurship

    How To Protect Your Small Business From Fraud

    Small business owners are at risk of being scammed. Here's what you need to know to avoid that.
  4. Entrepreneurship

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
  5. Personal Finance

    10 Of The Most Costly Computer Viruses Of All Time

    Here's a look at some of the costliest computer viruses of all time and the damage that was caused.
  6. Personal Finance

    How To Protect Your Smartphone From Identity Theft

    A smartphone is an identity thief's dream come true because of all of the information it contains. How can you protect your smartphone data?
  7. Personal Finance

    Famous White-Hat Hackers

    Think hacking is just for teenagers or malicious identity thieves? Think again. Here are some well-known hackers that use their skills in positive ways.
  8. Personal Finance

    Most Costly Computer Hacks Of All Time

    A computer hack doesn't just cost the company money; it also hurts their brand image.
  9. Credit & Loans

    Identity Theft: Who To Call For Help

    If your identity is stolen, it's critical to act fast. Find out what to do if it happens.
  10. Personal Finance

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.
  1. What are some high-profile examples of wash trading schemes?

    In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
  2. What are examples of inherent risk?

    Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
  3. What is the QQQ ETF?

    The PowerShares QQQ, previously known as the QQQQ, is a widely held and traded exchange-traded fund (ETF) that gives investors ... Read Full Answer >>
  4. What is the difference between wash trading and insider trading?

    Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
  5. What impact did the Sarbanes-Oxley Act have on corporate governance in the United ...

    After a prolonged period of corporate scandals involving large public companies from 2000 to 2002, the Sarbanes-Oxley Act ... Read Full Answer >>
  6. Why does Warren Buffett largely avoid investing in the technology sector?

    Warren Buffett has often said that he avoids investing in the technology sector because he does not like to own stocks in ... Read Full Answer >>

You May Also Like

Hot Definitions
  1. Zero-Sum Game

    A situation in which one person’s gain is equivalent to another’s loss, so that the net change in wealth or benefit is zero. ...
  2. Capitalization Rate

    The rate of return on a real estate investment property based on the income that the property is expected to generate.
  3. Gross Profit

    A company's total revenue (equivalent to total sales) minus the cost of goods sold. Gross profit is the profit a company ...
  4. Revenue

    The amount of money that a company actually receives during a specific period, including discounts and deductions for returned ...
  5. Normal Profit

    An economic condition occurring when the difference between a firm’s total revenue and total cost is equal to zero.
  6. Operating Cost

    Expenses associated with the maintenance and administration of a business on a day-to-day basis.
Trading Center
You are using adblocking software

Want access to all of Investopedia? Add us to your “whitelist”
so you'll never miss a feature!