123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Alert Users On New Banking Trojan

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Over the last few years, the finance and banking industry has been tackling with a range of sophisticated financial malware including Zeus, Bugat, and the more recent Zitmo Trojan and their variants. Usually, banking Trojans are designed to extract authentication information transmitted between a user’s browser and a bank server. Recently, Internet security firm Symantec identified a new component based Banking Trojan. Security researchers have named the Trojan as Trojan.Tatanarg. Several components of the Trojan are installed on the targeted computer, which are capable of performing multiple functions. Tatanarg not only disrupts the anti-virus solutions installed on the computer, but also eliminates other malware such as Zeus Trojan. The Trojan could alter HTML in the browser and insert additional fields on a web page.

One of the features of Tatanarg is to hijack the cryptographic protocol connections such as Security Socket Layer (SSL) and Transport Layer Security (TLS) between the user browser and the bank server and acts a proxy. According to the company, Tatanarg uses the information disseminated from the bank ...
... to encrypt outbound traffic and nullifies the certification validation process by creating a dubious certificate on the user’s browser side of the connection. The Trojan creates an impression to the users that they are conducting banking transactions on a secure connection as they are able to view https in the URL as well as the padlock icon.

The Trojan extracts the authentication information submitted by unsuspecting users. Tatanarg also facilitates a remote attacker to control the compromised computer. A remote attacker may issue arbitrary commands to restart the affected computer, purge the browser cookies and terminate active programs and processes.

The extracted authentication information may be used by cybercriminals to steal funds from a user’s online banking account and conduct unauthorized transactions. The collected information may also be sold to their peers in the underground crime market. User awareness is crucial to combat the manifold threats from cyber fraudsters. Online computer degree programs and online tutorials may enable Internet users to acquaint themselves of different types of Internet threats and adopt safe computing practices. Users must vary from downloading malicious attachments and clicking on suspicious links. They must also regularly update the security software to add latest anti-virus signatures. Adherence to security advisories and software updates is vital to prevent breach of computer systems and protecting confidential information.

Information security is crucial to create trust among bank customers and ensure business continuity. Hiring professionals with IT masters degree and other security certifications may help banks in securing their computer networks.

Internet security firms are under constant pressure to deal with the evolving sophisticated threats from cyber-attackers. Online technology degree programs may enable security professionals to learn new techniques and skills that would help them to combat the latest threats and secure the IT infrastructure.

Cybercriminals are expected to evolve more advanced techniques to defraud individuals and corporates. Security firms and software developers must continue to invest in research and develop new technologies to enhance Internet security.

Total Views: 340Word Count: 498See All articles From Author

Add Comment

Computers Articles

1. Spark Matrix™: Multi-carrier Parcel Management Solutions
Author: Umangp

2. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari

3. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions

4. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp

5. Pos Software Designed For Retail Operations
Author: EPOS Direct

6. Erp System That Reduces Stress And Improves Productivity
Author: Shalijah

7. Spark Matrix™: Global Service Parts Planning Application
Author: Umangp

8. Spark Matrix™: Enterprise Information Archiving
Author: Umangp

9. Textideo: Transforming Text Into Engaging Ai-powered Videos For Modern Creators
Author: Ethan Walker

10. Spark Matrix™: Enterprise Ai Search
Author: Umangp

11. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam

12. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates

13. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma

14. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions

15. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: