DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  2. Threat Modeling

    Threat modeling is the act of evaluating what needs to be protected ...
  3. Computer Abuse

    Computer abuse is the use of a computer to do something improper ...
  4. Cloud Computing

    A model for delivering information technology services in which ...
  5. Botnet

    A Botnet is a network of internet-connected devices that have ...
  6. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
Related Articles
  1. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  2. Tech

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  3. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  4. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  5. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  6. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  7. Insights

    How to Protect Your Assets From Cyber Thieves

    Taking these precautions can keep you a step ahead of identity thieves and fraudsters.
  8. Personal Finance

    What Does an Investment Banker Do?

    An investment banker works for a financial institution that helps companies, governments and agencies raise money by issuing securities.
  9. Investing

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. How do I obtain a banker's acceptance?

    Find out how to obtain a banker's acceptance, why you should treat it like a short-term loan and when you would most likely ... Read Answer >>
  3. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
  4. Why is marketing important to a company in the utilities sector?

    Find out what a banker's acceptance is, how it works, and why it should be considered a safe and liquid money market instrument. Read Answer >>
  5. Where can I find a company's annual report and its SEC filings?

    Thanks to the Internet, finding financial reports is easier than ever. Nowadays, every reputable company has an investor ... Read Answer >>
  6. What kinds of acts pertaining to interests in collective investment schemes are excluded ...

    Learn about some of the kinds of acts related to collective investment schemes that are excluded from regulation as financial ... Read Answer >>
Hot Definitions
  1. Financial Statements

    Records that outline the financial activities of a business, an individual or any other entity. Financial statements are ...
  2. Operating Cost

    Expenses associated with the maintenance and administration of a business on a day-to-day basis.
  3. Money Market

    A segment of the financial market in which financial instruments with high liquidity and very short maturities are traded. ...
  4. Block (Bitcoin Block)

    Blocks are files where data pertaining to the Bitcoin network is permanently recorded.
  5. Fintech

    Fintech is a portmanteau of financial technology that describes an emerging financial services sector in the 21st century.
  6. Ex-Dividend

    A classification of trading shares when a declared dividend belongs to the seller rather than the buyer. A stock will be ...
Trading Center