[SANS Webcast] Hitting the Silent Alarm on Banking Trojans

Banking Trojan(s) are a complex, expensive type of malware with a wide range of features. Unlike common info stealers – which are sold to anyone for a few dollars – Banking Trojan(s) are purchased by fewer, more professional threat actors. Some of these malware families have eventful histories spanning a decade, involving constant code changes, and occasionally arrests and leaks.

Banking Trojan(s) focus on stealing customer banking information but can often do much more. Threat actors pay a premium for this capability. They contain a far more extensive set of features than run-of-the-mill malware, usually packaged as a complex, modular framework. Modules of the malware can implement lateral movement, all types of credential stealing possible, botnet features, backdoors, crypto mining or deploying secondary payloads such as ransomware.

In this SANS Webcast, VMRay Sr. Threat Analyst Tamas Boczan, Product Manager Rohan Viegas and SANS Analyst Jake Williams will answer:

What are the most common banking Trojan(s) in the wild?
Which techniques do they use?
How can security professionals improve their detections?

Covered in The Webinar

About The Speakers

No data found

Explore Valuable Cybersecurity Resources