DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  2. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  3. Botnet

    A botnet is a network of internet-connected devices that have ...
  4. Home Banking

    Home banking is the practice of conducting banking transactions ...
  5. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  6. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
Related Articles
  1. Tech

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  2. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  3. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  4. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  5. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  6. Investing

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
  7. Tech

    The Internet Of Things In 2015

    By now, the internet has made its way into nearly all of our homes and via mobile devices into our pockets. Technology think-tank ABI estimates that there will be over 30 billion devices connected ...
  8. Tech

    Cryptocurrency Mining Malware Attacks Are a Threat

    More than 1.65 million computers have been targeted in malware attacks related to cryptocurrency mining.
  9. Personal Finance

    What do investment bankers really do?

    Investment bankers are essentially corporate financial advisors who help companies manage the process of raising financing for their activities. Check out more on their roles in banking industry.
  10. Tech

    Passwords Are Obsolete, Get With the Blockchain

    Blockchain technology could provide a better alternative to memorizing long, confusing, and easily forgotten passwords.
RELATED FAQS
  1. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  2. What should I look for when choosing a forex trading platform?

    A trading platform is a piece of software that acts as a conduit for information between a trader and a broker. A trading ... Read Answer >>
Hot Definitions
  1. Ethereum

    Ethereum is a decentralized software platform that enables SmartContracts and Distributed Applications (ĐApps) to be built ...
  2. Cryptocurrency

    A digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of ...
  3. Financial Industry Regulatory Authority - FINRA

    A regulatory body created after the merger of the National Association of Securities Dealers and the New York Stock Exchange's ...
  4. Initial Public Offering - IPO

    The first sale of stock by a private company to the public. IPOs are often issued by companies seeking the capital to expand ...
  5. Cost of Goods Sold - COGS

    Cost of goods sold (COGS) is the direct costs attributable to the production of the goods sold in a company.
  6. Profit and Loss Statement (P&L)

    A financial statement that summarizes the revenues, costs and expenses incurred during a specified period of time, usually ...
Trading Center