Banker Trojan

AAA

DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

INVESTOPEDIA EXPLAINS 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. In-App Purchasing

    The purchase of goods and services from an application on a mobile ...
  2. Asset Protection

    The concept of and strategies for guarding one's wealth. Asset ...
  3. Hacktivism

    A social or political activist plan that is carried out by breaking ...
  4. Vandalism And Malicious Mischief ...

    A type of insurance coverage that protects against losses sustained ...
  5. Software As A Service - SaaS

    A cloud-computing approach to providing users with access to ...
  6. Business Software & Services Industry ...

    An exchange-traded fund (ETF) that invests in business software ...
Related Articles
  1. Insurance

    Identity Theft: How To Avoid It

    Don't be a victim of this disturbing crime. Get insight into how perpetrators commit this form of fraud.
  2. Stock Analysis

    How Oracle Remains A Relatively Unknown Software Giant

    Among the world's largest corporations by market cap, few companies are as unfamiliar to the everyday consumer as Redwood City, Calif.-based Oracle Corp. How is the world's second-largest software ...
  3. Entrepreneurship

    How To Protect Your Small Business From Fraud

    Small business owners are at risk of being scammed. Here's what you need to know to avoid that.
  4. Entrepreneurship

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
  5. Personal Finance

    10 Of The Most Costly Computer Viruses Of All Time

    Here's a look at some of the costliest computer viruses of all time and the damage that was caused.
  6. Personal Finance

    How To Protect Your Smartphone From Identity Theft

    A smartphone is an identity thief's dream come true because of all of the information it contains. How can you protect your smartphone data?
  7. Personal Finance

    Famous White-Hat Hackers

    Think hacking is just for teenagers or malicious identity thieves? Think again. Here are some well-known hackers that use their skills in positive ways.
  8. Personal Finance

    Most Costly Computer Hacks Of All Time

    A computer hack doesn't just cost the company money; it also hurts their brand image.
  9. Credit & Loans

    Identity Theft: Who To Call For Help

    If your identity is stolen, it's critical to act fast. Find out what to do if it happens.
  10. Personal Finance

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.

You May Also Like

Hot Definitions
  1. SWOT Analysis

    A tool that identifies the strengths, weaknesses, opportunities and threats of an organization. Specifically, SWOT is a basic, ...
  2. Simple Interest

    A quick method of calculating the interest charge on a loan. Simple interest is determined by multiplying the interest rate ...
  3. Special Administrative Region - SAR

    Unique geographical areas with a high degree of autonomy set up by the People's Republic of China. The Special Administrative ...
  4. Annual Percentage Rate - APR

    The annual rate that is charged for borrowing (or made by investing), expressed as a single percentage number that represents ...
  5. Free Carrier - FCA

    A trade term requiring the seller to deliver goods to a named airport, terminal, or other place where the carrier operates. ...
  6. Law Of Supply And Demand

    A theory explaining the interaction between the supply of a resource and the demand for that resource. The law of supply ...
Trading Center