123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Alert Users On New Banking Trojan

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Over the last few years, the finance and banking industry has been tackling with a range of sophisticated financial malware including Zeus, Bugat, and the more recent Zitmo Trojan and their variants. Usually, banking Trojans are designed to extract authentication information transmitted between a user’s browser and a bank server. Recently, Internet security firm Symantec identified a new component based Banking Trojan. Security researchers have named the Trojan as Trojan.Tatanarg. Several components of the Trojan are installed on the targeted computer, which are capable of performing multiple functions. Tatanarg not only disrupts the anti-virus solutions installed on the computer, but also eliminates other malware such as Zeus Trojan. The Trojan could alter HTML in the browser and insert additional fields on a web page.

One of the features of Tatanarg is to hijack the cryptographic protocol connections such as Security Socket Layer (SSL) and Transport Layer Security (TLS) between the user browser and the bank server and acts a proxy. According to the company, Tatanarg uses the information disseminated from the bank ...
... to encrypt outbound traffic and nullifies the certification validation process by creating a dubious certificate on the user’s browser side of the connection. The Trojan creates an impression to the users that they are conducting banking transactions on a secure connection as they are able to view https in the URL as well as the padlock icon.

The Trojan extracts the authentication information submitted by unsuspecting users. Tatanarg also facilitates a remote attacker to control the compromised computer. A remote attacker may issue arbitrary commands to restart the affected computer, purge the browser cookies and terminate active programs and processes.

The extracted authentication information may be used by cybercriminals to steal funds from a user’s online banking account and conduct unauthorized transactions. The collected information may also be sold to their peers in the underground crime market. User awareness is crucial to combat the manifold threats from cyber fraudsters. Online computer degree programs and online tutorials may enable Internet users to acquaint themselves of different types of Internet threats and adopt safe computing practices. Users must vary from downloading malicious attachments and clicking on suspicious links. They must also regularly update the security software to add latest anti-virus signatures. Adherence to security advisories and software updates is vital to prevent breach of computer systems and protecting confidential information.

Information security is crucial to create trust among bank customers and ensure business continuity. Hiring professionals with IT masters degree and other security certifications may help banks in securing their computer networks.

Internet security firms are under constant pressure to deal with the evolving sophisticated threats from cyber-attackers. Online technology degree programs may enable security professionals to learn new techniques and skills that would help them to combat the latest threats and secure the IT infrastructure.

Cybercriminals are expected to evolve more advanced techniques to defraud individuals and corporates. Security firms and software developers must continue to invest in research and develop new technologies to enhance Internet security.

Total Views: 284Word Count: 498See All articles From Author

Add Comment

Computers Articles

1. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical

2. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology

3. Optimizing Manufacturing With Intelligent Online Production Planning
Author: Logitrac360

4. Extract Food App Review Data For Customer Sentiment
Author: Food Data Scrape

5. How Can Korean Naver Window Scraping Help You Analyze Korean Product Trends?
Author: Mobile App Scraping

6. Web Scraping Organic Vs Paid Listings On Food Apps
Author: Food Data Scrape

7. The Real Cost Of Ignoring Paid Marketing
Author: Nodesure Technologies Pvt Ltd

8. The Ultimate Guide To Height Safety Training In Melbourne
Author: Train Now

9. Why Helical Insight Is The Leading Open Source Business Analytics Tool
Author: Vhelical

10. Reliable Humidity Monitor And Refrigerator Alerting Solutions From Tempgenius For Critical Environments
Author: Chris Miller

11. Discover The Best Lenovo Store And Dell Showroom In Mumbai For Quality Tech
Author: Prachi Grey

12. Revolutionizing Data Reports The Rise Of Open Source Chat-based Reporting Tools
Author: Vhelical

13. Ultimate Guide To Doctor App Development
Author: EMed

14. How To Ensure Accurate Naver Blog Data Scraping On Android And Ios Devices?
Author: Mobile App Scraping

15. Powering Connectivity: Modern Networking Solutions
Author: Trinity Diaz

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: