About Us | Contact Us
View Cart

Banking Trojans: Menace to the Financial World

By Tanvee Dhir | Monday, April 4, 2022 - Leave a Comment

Understanding Banking Trojans…

Another Technical Article by Tanvee Dhir!

word cloud with various trojan names in various sizes

What are Banking Trojans?

A trojan is a malicious program that masquerades as a genuine one. They are often designed to steal sensitive information from users (login passwords, account numbers, financial information, credit card information, etc.). A banking trojan is a malicious computer program designed to gain access to privileged information from an online banking system. Banker trojans aim to steal credentials to/from financial institutions. IT experts around the globe agree that banking Trojans are an epidemic, infecting businesses, public entities, and nonprofits around the world.

Understanding the Attack Surface

The banking systems worldwide are incredibly complicated and have multiple elements. On a global scale, they connect regional banks, national banks, central banks, the World Bank, financial credit unions, and government bodies with a plethora of users (bank employees, government employees, contractors, and customers). These systems handle trillions of dollars in transactions such as money transfers, wire transfers, remote deposits, withdrawals, and loan payments.

Banking networks are interconnected systems of multiple components, including local and cloud servers, dedicated terminals at banks and retail locations, consumer devices, various software, and ATMs.  The connected systems use Ethernet, Wi-Fi, LTE, and other proprietary protocols. Each component involved poses its own set of vulnerabilities, thus increasing the attack surface for malicious actors to exploit.

Hackers can target financial institutions using a variety of tactics that evolve daily. Ransomware, DDoS attacks, consumer fraud, malware, and state-sponsored attacks are among the top five cyberattacks faced by banking networks. Research published by Kaspersky detected 97,661 new mobile banking Trojan variants in 2021, along with 17,372 new mobile ransomware Trojans. This makes banking trojans one of the most active categories of the malware family.

How Do They Get In?

Users at all levels of an organization are the most typical source of banking trojans being introduced into networks. Many of the tactics aren’t new and include:

  • Phishing (email), vishing (voicemail), and smishing (mobile messaging) attacks, in which victims are most likely to click on infected links.
  • Viruses in email attachments that are macro viruses (i.e., maldocs)
  • Malvertising: Compromised Ad campaigns
  • “Drive-by” attacks: occur when users visit a website infested with malware, which then infects the consumers’ PCs.
  • Versioning: Hiding behind legitimate applications and injecting malicious packages in-app updates.

Common Tactics, Techniques & Procedures

Banking trojans are malicious backdoor programs designed to steal financial information or money from online banking apps and other fintech platforms. The problem with Trojans is that they don’t usually cause immediate harm. They can stay in your system for a long time until they’ve gathered all the data they need while maintaining small footprints to avoid detection. Many of the widespread banking trojan strains are polymorphic in nature, i.e., they have rotating code and signatures which helps them evade anti-virus detection. They also evade detection by having dormant capabilities, hiding components in other files, forming part of a rootkit, or using heavy obfuscation. Newer strains of banking trojans collaborate with other malware to drop secondary payloads into the infected network, making it harder for automated EDRs to identify malicious patterns. SIEM and other EDR solutions that involve people could prove less likely to overlook such patterns.

A mobile banking trojan is usually downloaded from a malicious URL or the app store as legitimate software and tries to trick the user into allowing full permissions once installed on the device. Most mobile banking trojans (targeting Android OS) leverage the Android AccessibilityServices API in this way. Once on the system, it can run executable files, download and send files remotely, steal information from the clipboard, and log keystrokes, among other things. Some of them are even engineered to ensure that payloads are only deployed on devices from certain countries and prevent the malicious packages from being downloaded until after the publishing process on the app store.

Common Malware Families

Graphic thanks to F5 Labs

If you Googled “banking trojans,” you’d be bombarded with a growing list of malware families and versions. Many of these malware families have been around for a long time, and their new variants are constantly evolving. The most notable banking trojan malware families are – Zeus, Gozi, Emotet, SpyEye, Carberp, Shylock, Trickbot, Dridex, and Tinba. Each malware is unique in its tactics and evasion procedures, and a lot of newer malware kits are evolved versions of these older families. Malware variants are built using an existing codebase of commonly known trojans but with new signatures to avoid blacklists.

Detection and Prevention

When looking for Indicators of Compromise (IoCs) in a system, there are a few things that one can look out for:

User level:

  • Unusually slow web browser or PC performance.
  • A persistently running fan or a constantly rotating hard drive could indicate an infection.
  • New or unexpected pop-ups or form elements in banking web pages asking for financial information.
  • Failed login attempts the first time you try to log in, even though the password is right.

User and Enterprise level:

  • Unexpected pop-up windows.
  • Missing or manipulated files.
  • Anti-virus solutions turned off.
  • Workstation actively performing tasks even when no user is physically logged in.

Due to the persistent, polymorphic nature of banking trojans, companies should have a multilayered defense plan in place that incorporates advanced threat monitoring, rapid response, and user awareness to mitigate banking trojan risks.

User level:

  • Keep your security, utility, and application software up to date.
  • Use multi-factor authentication wherever possible.
  • Download apps and files only from trusted sources.
  • Always check for inconsistencies in login pages before putting in your banking credentials.
  • Learn about anti-social engineering techniques (spotting phishing emails, fake websites)


  • Ensure that updated security controls are implemented at every stage of operation
  • Use multi-factor authentication.
  • Periodic user awareness training for employees in all departments.
  • Implement traffic filtering to filter out spam and malicious content at the network perimeter.
  • Invest in good IDS and IPS solutions to catch infections promptly.
  • Limit the user access on their workstations to their roles.
  • Regular vulnerability assessments of network and assets.






Original article by Tanvee Dhir, CEH. Data Security Analyst, infotex




Latest News
    Community Banking and their layers of security. . . Michael Hartke’s first post as Executive Vice President! Thinking back to my first talk to security professionals in community banking almost 10 years ago, the question continues to this day. First some background… infotex was moderating the Indiana Bankers Association Security Conference when one of the […]
    Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  
    infotex and GoTo To all infotex managed security service Clients: As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022.  Based on the advisory from GoTo the products they offer that are affected include LogMeIn Pro, LogMeIn Central, […]
    An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organizations to adapt holistic technologies that can correlate all attack events. Therefore, developing XDR […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be easy to forget some of the older threats that have never gone […]
    Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and assessment approaches which intimidate the management team with their complexity.  […]
    The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectively ending its use after nearly 30 years.  Introduced in 1995, SHA-1 used a 160-bit hash […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]