Banker Trojan

DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Cloud Computing

    A model for delivering information technology services in which ...
  2. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  3. Program Trading

    Computerized trading used primarily by institutional investors ...
  4. Chief Information Officer - CIO

    A company executive who is responsible for the management, implementation ...
  5. Botnet

    An combination of "robot" and "network," botnet is a group of ...
  6. Software As A Service - SaaS

    A cloud-computing approach to providing users with access to ...
Related Articles
  1. Financial Advisor

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  2. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  3. Investing

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.
  4. Managing Wealth

    Online Banking: Your App Is Safest

    With cyber attacks becoming more frequent and sophisticated, it’s time to take steps to make your online banking experience as safe as possible.
  5. Financial Advisor

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  6. Markets

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  7. Personal Finance

    4 Ways To Shop Safely Online

    Online shopping has become the norm but that doesn't mean it isn't risk free. Don't shop safely and you can become the next victim of a computer hack.
  8. ETFs & Mutual Funds

    How To Start Trading: Trading Technology

    The most important technology for the independent trader is a computer, high-speed Internet connection and trading software for market analysis, testing and order execution.
  9. Markets

    5 Ways Your Small Business Is at Risk for a Cyber Attack

    Small business owners think they are immune to hacks because of their size, but they are not. When they find the guard is down, hackers are exploiting common weakness.
  10. Financial Advisor

    Advisors: Avoid These Common Tech Blunders

    Financial advisors who don't avoid these tech blunders could suffer dire consequences.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. What are the pros and cons of online checking accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
  3. A CFA Member or Candidate may be justified in disclosing confidential information ...

    The correct answer is: D) While acknowledging the importance of preserving confidentiality (and sensitivity of financial ... Read Answer >>
  4. Where can I find a company's annual report and its SEC filings?

    Thanks to the Internet, finding financial reports is easier than ever. Nowadays, every reputable company has an investor ... Read Answer >>
  5. Where can I get a company's prospectus and/or financial statements?

    These types of company documents have become increasingly accessible with the advent of the Internet. Most companies have ... Read Answer >>
  6. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
Hot Definitions
  1. Cyclical Stock

    An equity security whose price is affected by ups and downs in the overall economy. Cyclical stocks typically relate to companies ...
  2. Front Running

    The unethical practice of a broker trading an equity based on information from the analyst department before his or her clients ...
  3. After-Hours Trading - AHT

    Trading after regular trading hours on the major exchanges. The increasing popularity of electronic communication networks ...
  4. Omnibus Account

    An account between two futures merchants (brokers). It involves the transaction of individual accounts which are combined ...
  5. Weighted Average Life - WAL

    The average number of years for which each dollar of unpaid principal on a loan or mortgage remains outstanding. Once calculated, ...
  6. Real Rate Of Return

    The annual percentage return realized on an investment, which is adjusted for changes in prices due to inflation or other ...
Trading Center