Keyloggers and Spywares
Keyloggers and Spywares
Keystroke logging, often called keylogging, is the practice of noting (or logging) the keys
struck on a keyboard, typically in a covert manner so that the person using the keyboard
is unaware that such actions are being monitored.
Keystroke logger or keylogger is quicker and easier way of capturing the passwords and
monitoring the victims’ IT savvy behavior. It can be classified as software keylogger and
hardware keylogger.
Software Keyloggers
Software keyloggers are software programs installed on the computer systems which
usually are located between the OS and the keyboard hardware, and every keystroke is
recorded. Software keyloggers are installed on a computer system by Trojans or viruses without the
knowledge of the user.
Cybercriminals always install such tools on the insecure computer systems available in
public places (i.e., cybercafés, etc) and can obtain the required information about the
victim very easily.
A keylogger usually consists of two files that get installed in the same directory: a
dynamic link library (DLL) file and an EXEcutable (EXE) file that installs the DLL file
and triggers it to work. DLL does all the recording of keystrokes.
Hardware Keyloggers
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file
or in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards’ PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system
and can remove the tool. (Visit http://www.anti-keyloggers.com for more information)
Advantages of using antikeylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence,
antikeyloggers can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such
as other antivirus and antispy programs; if not updated, it does not serve the purpose,
which makes the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of
installing keyloggers.
4. It prevents ID theft (we will discuss it more in Chapter 5).
5. It secures E-Mail and instant messaging/chatting.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system
and can remove the tool. (Visit http://www.anti-keyloggers.com for more information)
Advantages of using antikeylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence,
antikeyloggers can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such
as other antivirus and antispy programs; if not updated, it does not serve the purpose,
which makes the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of
installing keyloggers.
4. It prevents ID theft (we will discuss it more in Chapter 5).
5. It secures E-Mail and instant messaging/chatting.
Spywares
Spyware is a type of malware (i.e., malicious software) that is installed on computers
which collects information about users without their knowledge.
The presence of Spyware is typically hidden from the user; it is secretly installed on the
user’s personal computer.
Sometimes, however, Spywares such as keyloggers are installed by the owner of a
shared, corporate or public computer on purpose to secretly monitor other users.
Some Important Spywares are as follows:
Spy. Spector Pro. Spector Pro.
eBlaster. Remotespy . Stealth Recorder Pro.
Stealth Website Logger. Flexispy. Wiretap Professional.
PC PhoneHome. SpyArsenal Print Monitor Pro.
Comments
Post a Comment