A survey of financial services professionals at 70 banks found more than half considered real-time man-in-the-middle attacks from banking Trojans such as ZeuS and Clampi on compromised customer computers to be the greatest threat to online banking today.Also read: ZeuS botnet code keeps getting better\u2026for criminalsIn these online attacks against banks and their customers, criminals managed to compromise PCs with a banking Trojan and make fraudulent funds transfers to their own accounts or those of \u201cmoney mules\u201d ordered to send the stolen amount to them. This is typically aimed at stripping business accounts of assets, and in the last few years, evidence shows Trojan-based attacks have been quite successful, though law enforcement around the world has also been able to break up a few of these often international cybercrime rings. \u00a0The \u201c2010 Online Banking Survey\u201d published this week, sponsored by PhoneFactor, \u00a0shows that the senior information technology, risk management and business unit managers responding to the survey consider banking Trojan such as ZeuS the greatest threat to online banking. Password phishing and pharming came in a distant second, with 24% calling that the greatest threat.Sixty-nine percent of the survey\u2019s respondents indicated their organizations had seen an increase in attacks against customer accounts from Zeus-style online banking Trojans in the last 12 months. Thirty-seven percent said the banking Trojans were actually the \u201cmost prevalent type of attack\u201d at their bank. The types of banking services considered most vulnerable are online ACH and wire transfers; one in three respondents rated these are as either \u201cextremely\u201d or \u201cvery\u201d vulnerable to attack.The survey also asked the 70 bank managers about what protective measures they are taking to address the ZeuS menace.Ninety percent of them said their banks use online authentication via questions asked for security purposes and more than 60% also use some type of one-time password method through hardware tokens. Some of the security measures planned over the next year include out-of-band phones (to verify transactions through what\u2019s typically an automated phone call) and text messages, plus fraud scoring.Keri McKinney, the SunTrust Banks group vice president of treasury and payment solutions, says one defensive measure her organization adopted last spring to protect banking customers from banking malware is the Trusteer Rapport software and service.\u201cWe\u2019re offering it free of charge to our clients,\u201d says McKinney, who says the Trusteer secure browser software plug-in is intended to detect and prevent the type of man-in-the-middle attacks where banking Trojans compromise the victim\u2019s machine in order make unauthorized fraudulent funds transfers.The Trusteer software, now used by about 10% of SunTrust\u2019s commercial clients, has detected when clients\u2019 machines become infected by malware.. \u201cWe\u2019ve had several instances,\u201d says McKinney, and when an infection is detected, the bank\u2019s fraud detection unit immediately is involved to help disinfect the PC and there\u2019s often phone-based discussion about the situation.Nevertheless, it\u2019s not mandatory for customers to use the Trusteer anti-malware defense. \u201cWe recommend it to clients; it\u2019s the best practice,\u201d says McKinney. The bank also supports several other anti-fraud methods.According to the banking survey, 76% of the banking manager respondents said their investments in online banking security were being driven by concern about fraud losses and regulatory requirements. But the \u201cimpact on the institution\u2019s reputation\u201d ranked even higher, with 85% saying worry lies there as well.Read more about wide area network in Network World's Wide Area Network section.