Keylogger ... hidden 'enemies'!

Commercial recording of keylogger programs can be said to be the most formidable security threat.

Commercial recording of keylogger programs can be said to be the most formidable security threat.

Far from being 'malicious' programs like viruses, trojans, spyware ., most commercial keylogger programs are considered by Windows and security programs as a 'legitimate' application when installed. put on the computer.

That's why any "dreamy" hacker can collect some sophisticated keylogger to learn privacy secrets or harm others .

Picture 1 of Keylogger ... hidden 'enemies'!
The culprits steal chat accounts, email, online games . most of them now come from sophisticated commercial keylogger programs that have been secretly installed on public computers like computers. Office calculation, Internet shop ., even home computers.

It is extremely difficult to track the activity of commercial keyloggers, even for keylogger users to 'spy on' others, because almost every keylogger program has other 'camouflage' skills. each other and very sophisticated.

Some keyloggers in the form of 'great clarity' will present themselves right in the catalog of ' Program Files ' application programs, and you can also detect its activity in the card' Applications ' of ' Windows Task Manager '.

Most 'malicious' keyloggers can only record a limited number of actions, such as characters entered in the ' Username ', ' Password ' fields, for example.

Meanwhile, commercial keyloggers can record almost 100% of all actions taking place on the keyboard in the same order that the user typed in.

In addition, the ability to be considered the most unique of the commercial keylogger is the feature of 'taking photos' of all happenings on the screen and exporting it as an extremely intuitive digital image.

It is this capability that disables the security type by using the 'virtual keyboard' that many 'sophisticated' users use today.

But most of the current secondary-class keyloggers hardly leave any trace that can detect its activity. After a successful installation, these keyloggers will provide its owner with a password or a complex complex keystroke, usually up to four keys, so that only its owner can activate the program. .

The method that high players use keyloggers often does is to install the keylogger application into a 'hoover crawl' subdirectory hidden deep inside other applications, deleting the display name in the directory store. ' Program Files ' application program , even changing the executable file's name . However, there are still some basic methods for detecting a region keylogger.

In principle, you can only find a keylogger hiding in your computer when you know some of its own characteristics: name of installation directory, executable file name, file format containing information stolen by it, the file name contains 'malicious code' .

Most commercial keyloggers now automatically create a text file type (usually TXT or HTM) to record all actions from the keyboard, as well as create image files (usually JPG or BMP). show everything it captures from the screen. Keylogger will automatically save these files to a certain 'sealed' folder after a certain period of time. Therefore, you can easily determine whether your computer has a "raid" keylogger by "hunting" strange TXT or JPG files in a "scary" way over time to list items. a series of TXT and JPG files are created simultaneously in a certain time.

However, high-end 'special' keyloggers do not name saved files in easily detected forms like TXT or JPG. It will have a file format with a strange extension that you never knew before, even some types of files that can only be viewed by the keylogger itself.

With this 'lofty' keylogger, it seems that the only way to detect it is to know its own characteristics. At the very least, please be aware of its specific spy file format or executable file name.

Update 13 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment