The keyloggers 'hit'
In the article on August 24, we introduced some "genuine" keyloggers. In this issue, we would like to introduce some keylogger programs that are currently the most popular for you to have identification and prevention facilities.
Hegemonic keyloggers are keyloggers that have the following characteristics: rarely show their names in ' Program Files ', never place their activity icons in the clock tray, never leave them there. My face in the ' Applications ' tab of ' Windows Task Manager ', is always able to operate in the underground operation mode, it is difficult to remove if you do not enter the correct password and hotkey combination . Here are 7 programs Popularity keylogger now popular.
007 Spy Software : This Keylogger actively marks me in C: Program FilessCommon FilesMicrosoft SharedDAO; The executable file is named svchost.exe ; Use Ctrl + Alt + Shift + F7 to activate; Ability to silently send information it records received to an e-mail address or FTP server; It is so "tricky" that storing TXT files records keyboard activity as well as JPG files that take screenshots in an extremely 'special' folder, which is C: RecycledWinLiveUpdate32scrdata , ie it marks data in . crates garbage of the computer.
2. All-In-One Spy Keylogger : The default installation directory is C: Some_undistinguished_folderAIOSKL ; The executable file is named ctfmon.exe ; The hotkey combination used to display the default is Ctrl + Alt + Shift + U ; Take a screen shot in JPG format, export the information to record the keyboard operation in TXT format and store in the installation directory.
3. Ardamax Keylogger : Default setting in folder C: Program FilesUIB ; The executable file is called UIB.exe ; Files containing stolen information are called UIB.001 , UIB.002 . until UIB.999 and located in the installation directory; The ability to hide yourself very well and use the key combination Ctrl + Alt + Shift + H to display.
The main user interface of Ardamax Keylogger
4. Eye Spy Pro : The default installation in the folder C: Program FilesESP Demo ; The executable file is named ESPDemo.exe ; Use the default hotkey combination Ctrl + Shift + F5 ; Save screenshots in JPG or BMP format, save keyboard information as LOG file and these files are saved in a folder called ' Projects ' in the installation directory; Ability to send keyboard information to an e-mail address or an FTP server.
5. Real Spy Monitor : The default setting in folder C: Program FilesReal Spy Monitor ; The executable file is named winrsm.exe ; Use hotkey Ctrl + Alt + S ; Capture screen image as JPG file, record keyboard operation as TXT file and hide all in default folder C: WindowsRSM ; Ability to secretly send recorded information about an e-mail or certain FTP server. The program is designed to be extremely scalable with its own activity recognition interface for each type of extremely intuitive application.
The extremely intuitive monitoring interface of Real Spy Monitor
6. Total Spy : the default installation directory is C: Program FilesTS Trial ; The executable file is named ctfmon.exe ; The default hotkey combination is Ctrl + Alt + Shift + U ; Take a screen shot in JPG format and export the information to record the keyboard operation in TXT format; Store the information recorded in folders named ' daily_log_files ' and " daily_visited_urls ' located in the installation directory.
7. XT Spy : This keylogger is very misleading when notifying the installer that it will install the program in C: Program FilesXTS folder , but it actually silently installs it into the ' Xfigsys ' folder located on the drive. disc C; Its executable file is xfigsys.exe ; Storing JPG files for screenshots and TXT recording keyboard operations in deep subdirectories in the ' Xfigsyslg ' folder is also in the installation directory. Initially this Keylogger can be sorted into the correct form because it clearly shows up in the ' Applications ' tab of' Windows Task Manager 'but after logging in to the program by password, it immediately disables the access path' Windows Task Manager 'so people can't discover it.
HOANG HAI
- The 'righteous' keyloggers
- The security war has entered a new phase
- Using Kaspersky Antivirus is more perfect
- Anti Keylogger with bare hands
- Surf the web more safely with anti-Keylog software
- New anti-virus technology: Rudra
- Microsoft fixes 10 errors in Internet Explorer
- Sustainable agriculture model for alkaline soils
- Super NASA computers simulate a whirlwind from a drone plane
- Symbian encourages cheap 3G services
- This invention can eliminate complications in cosmetic and medical surgery
- Arsenic can be fatal after 20 years