DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Malware

    Malware is a software designed to allow an outside party access ...
  2. Threat Modeling

    Threat modeling is the act of evaluating what needs to be protected ...
  3. Cloud Computing

    A model for delivering information technology services in which ...
  4. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  5. Computer Crime Insurance

    An insurance policy that provides protection from crimes committed ...
  6. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
Related Articles
  1. Tech

    Cybersecurity Steps Everyone Should Take

    Anyone using a device connected to the internet should employ these cybersecurity practices.
  2. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  3. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  4. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  5. Insights

    The Industry Handbook: Software Industry

    Discover how the software industry has changed throughout the years to become a mainstay for businesses from programming to software as a service.
  6. Insights

    How to Protect Your Assets From Cyber Thieves

    Taking these precautions can keep you a step ahead of identity thieves and fraudsters.
  7. Investing

    Must-Have Software For The Home Office

    If you have a home business, these pieces of software can be extremely helpful to you.
  8. Personal Finance

    What Does an Investment Banker Do?

    An investment banker works for a financial institution that helps companies, governments and agencies raise money by issuing securities.
  9. Personal Finance

    Personal Banker: Job Description & Average Salary

    Discover the job duties and typical salary of a personal banker, and identify the education and skill set needed to be successful in the field.
  10. Insights

    10 Of The Most Costly Computer Viruses Of All Time

    Here's a look at some of the costliest computer viruses of all time and the damage that was caused.
RELATED FAQS
  1. How can I look up average banker's acceptance yields?

    Discover what a banker's acceptance note is, how it is commonly used, and where investors can find information on available ... Read Answer >>
  2. How does online banking assist with budgeting?

    Setting up online banking can make a personal budget easier to manage through the use of multiple accounts or expense categories ... Read Answer >>
  3. How can an investment banker switch to a career in corporate finance?

    Understand the difference between investment banking and corporate finance. Learn how an investment banker can switch to ... Read Answer >>
Hot Definitions
  1. Net Present Value - NPV

    Net Present Value (NPV) is the difference between the present values of cash inflows and outflows. Used in capital budgeting ...
  2. Return On Equity - ROE

    The amount of net income returned as a percentage of shareholders equity. Return on equity measures a corporation's profitability ...
  3. Bond

    A bond is a fixed income investment in which an investor loans money to an entity (corporate or governmental) that borrows ...
  4. Whole Life Insurance Policy

    A life insurance contract with level premiums that has both an insurance and an investment component. The insurance component ...
  5. Compound Annual Growth Rate - CAGR

    The Compound Annual Growth Rate (CAGR) is the mean annual growth rate of an investment over a specified period of time longer ...
  6. Capital Asset Pricing Model - CAPM

    A model that describes the relationship between risk and expected return and that is used in the pricing of risky securities. ...
Trading Center