DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Botnet

    A Botnet is a network of internet-connected devices that have ...
  2. Program Trading

    Computerized trading used primarily by institutional investors ...
  3. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
  4. Chief Information Officer - CIO

    A company executive who is responsible for the management, implementation ...
  5. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software ...
  6. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
Related Articles
  1. Investing

    Mobile and Tablet Website Viewing Surpasses Desktop For the First Time

    October saw more websites viewed through mobile devices than desktop computers, for the fist time ever.
  2. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  3. Tech

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  4. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  5. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  6. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  7. Tech

    Online Banking: Your App Is Safest

    With cyber attacks becoming more frequent and sophisticated, it’s time to take steps to make your online banking experience as safe as possible.
  8. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  9. Insights

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  10. Tech

    4 Ways To Shop Safely Online

    Online shopping has become the norm but that doesn't mean it isn't risk free. Don't shop safely and you can become the next victim of a computer hack.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. What Are the Pros and Cons of Online Checking Accounts?

    Learn about the ways an online checking account can save you time and money, but understand the drawbacks before signing ... Read Answer >>
  3. Where can I find a company's annual report and its SEC filings?

    Thanks to the Internet, finding financial reports is easier than ever. Nowadays, every reputable company has an investor ... Read Answer >>
  4. How do I obtain a banker's acceptance?

    Find out how to obtain a banker's acceptance, why you should treat it like a short-term loan and when you would most likely ... Read Answer >>
  5. Where can I get a company's prospectus and/or financial statements?

    These types of company documents have become increasingly accessible with the advent of the Internet. Most companies have ... Read Answer >>
Hot Definitions
  1. Operating Ratio

    A ratio that shows the efficiency of a company's management by comparing operating expense to net sales. Calculated as:
  2. Expense Ratio

    A measure of what it costs an investment company to operate a mutual fund. An expense ratio is determined through an annual ...
  3. Pro Forma

    A Latin term meaning "for the sake of form". In the investing world, it describes a method of calculating financial results ...
  4. Trumpcare

    The American Health Care Act, also known as Trumpcare and Ryancare, is the Republican proposal to replace Obamacare.
  5. Free Carrier - FCA

    A trade term requiring the seller to deliver goods to a named airport, terminal, or other place where the carrier operates. ...
  6. Portable Alpha

    A strategy in which portfolio managers separate alpha from beta by investing in securities that differ from the market index ...
Trading Center