Banking Trojans are malware designed to collect online banking credentials and other sensitive information from infected machines. This information, once exfiltrated to an attacker, can be used to steal money and commit other forms of fraud, such as identity theft.
Banking trojans, a type of Trojan horse malware, typically gain access to a computer by pretending to be legitimate software. For example, a Trojan may be distributed as a malicious attachment to a phishing email or downloaded as part of a cracked or fake copy of legitimate software.
Once installed on an infected machine, banking Trojans can collect online banking login credentials and other sensitive information in various ways. Some methods include dumping cached credentials from the system and web browsers, monitoring the system keyboard, searching the filesystem for stored passwords, and using a keylogger to collect login details when a user browses to target websites.
The primary goal of a banking Trojan is to steal login credentials and other sensitive information. This stolen data can be used to take over a user’s account on the online banking service, steal money, and potentially perform identity theft and other forms of fraud. Banking Trojans are a popular form of malware because they provide cybercriminals with a direct means of monetizing their attacks.
Banking Trojans are also dangerous because they act as remote access Trojans (RAT) and give an attacker the ability to remotely control the malware installed on an infected system, which can be used to carry out other attacks as well. For example, many banking Trojans are commonly used to drop ransomware as well, enabling cybercriminals to carry out multi-stage attacks once they gain access to an infected computer.
Some of the most dangerous and prolific banking Trojans include the following:
A successful banking Trojan infection places an individual’s finances and identity at risk. Some means of detecting these infections include the following:
Companies and individuals can protect against banking Trojans via various means, including the following:
A banking Trojan infection poses a significant risk to personal security. In addition to compromising the login credentials needed to steal money from online accounts, the malware can also collect sensitive personal information for use in identity theft and other fraud.
Managing the threat of banking Trojans requires diligence by all parties. Financial institutions can protect themselves and their customers by monitoring for suspicious logins that could indicate accounts compromised by a banking Trojan. On the user side, deploying an endpoint security solution such as Check Point’s Harmony Endpoint can prevent infections by banking Trojans and other malware. To learn how Harmony Endpoint can protect your organization and its employees, sign up for a free demo today.