DEFINITION of 'Banker Trojan'

A malicious computer program designed to gain access to confidential information stored or processed through online banking systems. Banker Trojan is a form of Trojan horse, and can appear as a legitimate piece of software until it is installed on an electronic device. Once installed, the Trojan horse can gain access to computer files and systems. This type of computer program is built with a backdoor, allowing outside parties to gain access to a computer.

BREAKING DOWN 'Banker Trojan'

Banker Trojan is a Trojan horse that redirects traffic from banking and financial websites to another website, ostensibly a website that the attacker has access to. When the software is executed it copies itself onto the host computer, creating folders and setting Registry entries each time the system is started. It searches for specific cookie files relating to personal finance, which have been stored on the computer by financial websites during an Internet visit.

The Trojan horse can execute a number of operations, including running executable files, downloading and sending files remotely, stealing information from a clipboard, and logging keystrokes. It collects cookies and passwords, and may remove itself from a computer when commanded.

Consumers and businesses should be aware of the programs that they download, but sometimes mistakes can happen and computers can become infected. Criminals have become more sophisticated in how they obtain confidential financial information. Viruses, malware, and Trojan horses can still steal usernames and passwords, but many are moving to real-time collection and can transfer money to other accounts in clever ways. Financial institutions have combatted the effectiveness of such Trojan horse programs by increasing the security of their authentication processes. This is especially important as banks increase the number of banking activities that can be conducted via the Internet or mobile devices, which are inherently less secure than conducting banking activities in person. 

 

RELATED TERMS
  1. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  2. Threat Modeling

    Threat modeling is the act of evaluating what needs to be protected ...
  3. Computer Abuse

    Computer abuse is the use of a computer to do something improper ...
  4. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software ...
  5. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  6. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
Related Articles
  1. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  2. Tech

    Cybersecurity Steps Everyone Should Take

    Anyone using a device connected to the internet should employ these cybersecurity practices.
  3. Tech

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  4. Insights

    6 Ways To Protect Yourself Against Cybercrime

    Cybercrime is becoming more and more serious in the U.S. Here are some ways you can protect your finances from cybercriminals.
  5. Tech

    How Advisors Can Combat Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to combat it.
  6. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  7. Investing

    Equestrian Economics: The 2017 Quarter Horse Congress

    The financial Fitness Tour lands in Columbus, OH for the 2017 American Quarter Horse Congress.
  8. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  9. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  10. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. What kinds of acts pertaining to interests in collective investment schemes are excluded ...

    Learn about some of the kinds of acts related to collective investment schemes that are excluded from regulation as financial ... Read Answer >>
  3. Why is marketing important to a company in the utilities sector?

    Find out what a banker's acceptance is, how it works, and why it should be considered a safe and liquid money market instrument. Read Answer >>
  4. How can an investment banker switch to a career in corporate finance?

    Understand the difference between investment banking and corporate finance. Learn how an investment banker can switch to ... Read Answer >>
  5. Where can I get a company's prospectus and/or financial statements?

    These types of company documents have become increasingly accessible with the advent of the Internet. Most companies have ... Read Answer >>
Hot Definitions
  1. Efficiency Ratio

    Ratios that are typically used to analyze how well a company uses its assets and liabilities internally. Efficiency Ratios ...
  2. Turkey

    Slang for an investment that yields disappointing results or turns out worse than expected. Failed business deals, securities ...
  3. Maintenance Margin

    The minimum amount of equity that must be maintained in a margin account. In the context of the NYSE and FINRA, after an ...
  4. Salvage Value

    The estimated value that an asset will realize upon its sale at the end of its useful life. The value is used in accounting ...
  5. Cryptocurrency

    A digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of ...
  6. Promissory Note

    A financial instrument that contains a written promise by one party to pay another party a definite sum of money either on ...
Trading Center