DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  2. Cloud Computing

    A model for delivering information technology services in which ...
  3. Computer Abuse

    Computer abuse is the use of a computer to do something improper ...
  4. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  5. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  6. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software ...
Related Articles
  1. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  2. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  3. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  4. Managing Wealth

    Is Cloud Computing An Investable Trend?

    Wall Street loves the next hot trend of cloud computing, but is it for real?
  5. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  6. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  7. Tech

    7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
  8. Personal Finance

    What Does an Investment Banker Do?

    An investment banker works for a financial institution that helps companies, governments and agencies raise money by issuing securities.
  9. Tech

    The Internet Of Things In 2015

    By now, the internet has made its way into nearly all of our homes and via mobile devices into our pockets. Technology think-tank ABI estimates that there will be over 30 billion devices connected ...
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
  3. How do I obtain a banker's acceptance?

    Find out how to obtain a banker's acceptance, why you should treat it like a short-term loan and when you would most likely ... Read Answer >>
  4. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
  5. What kinds of acts pertaining to interests in collective investment schemes are excluded ...

    Learn about some of the kinds of acts related to collective investment schemes that are excluded from regulation as financial ... Read Answer >>
  6. How can an investment banker switch to a career in corporate finance?

    Understand the difference between investment banking and corporate finance. Learn how an investment banker can switch to ... Read Answer >>
Hot Definitions
  1. Tender Offer

    An offer to purchase some or all of shareholders' shares in a corporation. The price offered is usually at a premium to the ...
  2. Ponzi Scheme

    A fraudulent investing scam promising high rates of return with little risk to investors. The Ponzi scheme generates returns ...
  3. Dow Jones Industrial Average - DJIA

    The Dow Jones Industrial Average is a price-weighted average of 30 significant stocks traded on the New York Stock Exchange ...
  4. Revolving Credit

    A line of credit where the customer pays a commitment fee and is then allowed to use the funds when they are needed. It is ...
  5. Marginal Utility

    The additional satisfaction a consumer gains from consuming one more unit of a good or service. Marginal utility is an important ...
  6. Contango

    A situation where the futures price of a commodity is above the expected future spot price. Contango refers to a situation ...
Trading Center