DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Cloud Computing

    A model for delivering information technology services in which ...
  2. Botnet

    A Botnet is a network of internet-connected devices that have ...
  3. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  4. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  5. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  6. Program Trading

    Computerized trading used primarily by institutional investors ...
Related Articles
  1. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  2. Tech

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  3. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  4. Tech

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.
  5. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  6. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  7. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  8. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  9. Insights

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  10. Tech

    7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
RELATED FAQS
  1. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
  2. How do I obtain a banker's acceptance?

    Find out how to obtain a banker's acceptance, why you should treat it like a short-term loan and when you would most likely ... Read Answer >>
  3. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
  4. What kinds of acts pertaining to interests in collective investment schemes are excluded ...

    Learn about some of the kinds of acts related to collective investment schemes that are excluded from regulation as financial ... Read Answer >>
  5. Why is marketing important to a company in the utilities sector?

    Find out what a banker's acceptance is, how it works, and why it should be considered a safe and liquid money market instrument. Read Answer >>
  6. How does online banking assist with budgeting?

    Setting up online banking can make a personal budget easier to manage through the use of multiple accounts or expense categories ... Read Answer >>
Hot Definitions
  1. Aggregate Demand

    The total amount of goods and services demanded in the economy at a given overall price level and in a given time period.
  2. Fixed Cost

    A cost that does not change with an increase or decrease in the amount of goods or services produced. Fixed costs are expenses ...
  3. Blue Chip

    A blue chip is a nationally recognized, well-established, and financially sound company.
  4. Payback Period

    The length of time required to recover the cost of an investment. The payback period of a given investment or project is ...
  5. Collateral Value

    The estimated fair market value of an asset that is being used as loan collateral. Collateral value is determined by appraisal ...
  6. Fiduciary

    A fiduciary is a person who acts on behalf of another person, or persons to manage assets.
Trading Center