dc.contributor |
EUROPOL |
|
dc.date.accessioned |
2019-04-02T13:26:59Z |
|
dc.date.available |
2019-04-02T13:26:59Z |
|
dc.date.issued |
2017-03-21 |
|
dc.identifier.other |
1694577864 |
de_DE |
dc.identifier.uri |
http://hdl.handle.net/10900/87456 |
|
dc.identifier.uri |
http://nbn-resolving.de/urn:nbn:de:bsz:21-dspace-874566 |
de_DE |
dc.identifier.uri |
http://dx.doi.org/10.15496/publikation-28842 |
|
dc.description.abstract |
The “Holy Grail” for most cybercriminals is to steal the money of unsuspecting users. Unfortunately, there are many ways for cybercriminals to access confidential financial information, including bank account credentials. These methods include phishing campaigns with a fake bank web page, and info-stealing malware with simple keylogging capabilities for documenting victims’ usernames and passwords.
Banking Trojans differ from standard Trojans, as they are written for the express purpose of stealing confidential information from victims’ bank accounts and online payment services. They are sophisticated and equipped with Man-in-the-Browser (MiB) techniques such as web injections or redirection mechanisms. |
en |
dc.language.iso |
en |
de_DE |
dc.publisher |
Universität Tübingen |
de_DE |
dc.subject.classification |
Computerkriminalität , Bank |
de_DE |
dc.subject.ddc |
360 |
de_DE |
dc.title |
Banking Trojans: From Stone Age to Space Era |
en |
dc.title |
A Joint Report by Check Point and Europol |
en |
dc.type |
Report |
de_DE |
utue.publikation.fachbereich |
Kriminologie |
de_DE |
utue.publikation.fakultaet |
Kriminologisches Repository |
de_DE |
utue.opus.portal |
kdoku |
de_DE |