Banking Trojans are proven to be a successful cybercrime business model. However, the creation of URL blacklists heavily affected the cybercrime operations. This talk shows new command-and-control methods the cybercriminals have implemented to avoid blacklists. Another challenge for banking Trojan authors was the emerge of Google Chrome and the 64bit variant of Microsoft Internet Explorer, which require new techniques to hook encryption functions and plant the Man-in-the-Browser. In this part of the talk it is shown how banking Trojan authors accomplish this task.