Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv

Keyloggers: what are they and how are they used to steal personal data

RedX

TRUSTED VENDOR
Staff member
Joined
Nov 26, 2020
Messages
716
Hackers aren't the only ones who can use keyloggers to intercept your keyboard taps to extract passwords and other sensitive information.

After reading enough articles about cybersecurity and hackers , you will definitely stumble upon the topic of keyloggers. It sounds very sinister, mysterious and technological, but what are keyloggers really and how dangerous are they?

Well, in this article we will tell you everything you need to know about them. What is it? How are they used? How do I detect keyloggers? And how to protect yourself from them?

What are keyloggers?
Keyloggers
(also known as push memory devices) are programs that bind themselves to your operating system or Internet browser. As the name suggests, their purpose is to remember keystrokes on your device.

They can be programmed to remember everything you type, or they can only remember what you type on certain sites and fill in fields (such as the PayPal password field). Therefore, keyloggers are usually considered malicious software.

Most often, they get on your device together with the virus software, although they are not viruses themselves. Sometimes they can even be used legally (but this does not make their use ethical).

How do keyloggers work?
Let's explain it in a simple way.

When you use the keyboard, your keystrokes are transmitted from it to your device. Your keyboard driver translates the scan code (key press data) into letters, numbers, and symbols. Thanks to this process, your operating system and any application you use can recognize your clicks.

So, the Keylogger pretends to be the receiving device, and thus receives keystroke data just like the operating system or applications that you use.

Software and hardware keyloggers
Most people are only familiar with software keyloggers - programs designed to remember keystrokes that run in the background of your operating system.

Usually, those who install a Keylogger on your device block access to it and the data it collects. They can also configure the program to send the collected data via email, websites, or upload it to databases.

There are also hardware keyloggers. These are physical devices that perform the same functions (remember keystrokes). But they don't need to be installed, instead you physically connect them to your computer.

Most hardware keyloggers are installed in the USB port through which the keyboard wire must be connected to the computer. Right in between, to be precise.

Yes, you can easily buy it on Amazon or even on Aliexpress.

Why would someone want to use of hardware keyloggers?
The biggest advantage of such keyloggers is that the software can't detect them. In addition, they are independent of software, so software errors do not affect their operation.

In older models, the person using the Keylogger had to extract it in order to access the data recorded on it. But new models can connect to the local WiFi network and transmit data via email.

Hardware keyloggers are still used if the victim is the owner of a desktop computer. However, in the case of a laptop, it will not be difficult to detect such a Keylogger.

Oh Yes, and don't assume that you're not immune to a hardware Keylogger if you use a wireless keyboard. Many of them are vulnerable to KeySniffer attacks. It may not be a hardware Keylogger, but it also allows an attacker to receive keystroke data if it is transmitted over unencrypted communication channels.

In addition, there is also KeySweeper - a hidden hardware Keylogger that looks like a regular charger. It can conduct passive surveillance, decode and remember keystrokes from different wireless keyboards. Next, it sends keystroke data to the attacker via GSM. Moreover, you can configure it to send data based on:

  • Custom names
  • URL links
  • Key words

How are keyloggers used?
For cyber attacks, right? Yes, hackers use keyloggers very often. But they're not the only ones doing it. Surprisingly, families and online marketers can use them too.

Hackers
Keyloggers are a useful tool for cyber criminals. Often, this is how they manage to hack into user accounts and get corporate data. Hackers usually distribute keyloggers via:

  • Launch of installations or activation when clicking on a link or opening an attachment in a phishing email.
  • Launch the installation or activation of a specific program.
  • Use of other malicious programs (in particular, Trojans) to install keyloggers on the device.
  • The use of vulnerable browsers with scripting of web pages.
  • Create fake websites and use phishing messages or MITM attacks to interact with them.
In some cases, cyber criminals can even set up a Keylogger so that it gets into the network and spreads to all devices connected to it. Or they can set up the installation of other malicious software from this network. Hackers can also install hardware keyloggers in Internet cafes. Or a fraudster can steal valuable information about the business in which he got a job.

And no, experienced cyber criminals aren't the only ones who use keyloggers. Even failed mom hatzkers who are in school can use keyloggers to raise their grades.

Famous cyber attacks using keyloggers:

  • In 2015, hackers used phishing and keyloggers to break into the servers of the insurance company Anthem.
  • In 2016, researchers from RisklQ (in collaboration with CleaeSky) discovered that cyber criminals used a web Keylogger to hack into many popular eCommerce sites.
  • In 2016, security researchers from Trend Micro found that hackers used a commercial Keylogger program (Olympic Vision) to hack into the accounts of employees and company managers in 18 countries (USA, middle East, Asia).
  • In 2018, a new strain of malicious software called Virobot was discovered. It could not only serve as a Keylogger, but also as a ransomware and botnet program.
  • In 2017, hackers used a malicious Keylogger program to break into the San Antonio women's health Institute, the largest gynecological Institute in San Antonio.

Employers
Companies often use keyloggers to track their employees.This is called " corporate keylogging’ and it is absolutely legal, at least as long as keyloggers are installed only inside the corporate network and only on work computers.

Employers usually use software keyloggers. It teams can configure them to detect keywords and send real-time alerts when someone copies files, enters sensitive data, or executes hidden commands.

Within the company, it makes sense to use keyloggers:

  • This helps the security services to find internal threats.
  • This helps managers and supervisors make sure that employees meet the necessary performance indicators and do not let them relax.
  • It also helps auditors check whether the business is complying with laws and regulations. If someone inside the company violates them, then keyloggers will help you easily identify this person.
Do all employers use keyloggers? There is no exact information about this. We think it's safer to assume that your management has installed keyloggers on the company's computers than to just hope that they haven't. Read your employment contract in full. There may be an item about registering keystrokes.

But in any case, if you can work from your personal computer, then bringing it to work-you should be safe.

Internet marketers
Back in 2017, researchers at Princeton University found that approximately 482 websites out of the top 50,000 Alexa websites (quite popular websites) used web scripts that acted as keyloggers. And scripts remember not only keystrokes, but also mouse movements and scrolling.

Why would they do that? Because it helps marketers collect behavioral data about you. How exactly you interact with their sites, what ads interest you most, what content you like and don't like, and so on. In addition, it teams, product managers and / or business owners, and UX designers can also use keyloggers to identify and implement user requests, usually during an unboarding or beta release.

Does that sound questionable? Yes, but in a General sense, it is legal because they mention it in the user agreement. You know, that long page with lots of text and legal points that you're too bored to read (don't worry, most people do the same).

And to be honest, it makes sense. This greatly helps companies make the user experience more personalized.

Jealous spouses and parents with Hyper guardianship
Husbands or wives who are concerned that their significant other is cheating on them, or parents who want to keep a close eye on what their children are doing online, can also use keyloggers.

No, we are not exaggerating. There are even articles on the Internet that recommend the best keyloggers for monitoring children's social media activity.

Is it legal? It's hard to say. The use of keyloggers is illegal in most countries. However, according to some divorce lawyer websites, using them can be technically legal if you are "careful". In addition, the article we linked to above says that you can use a Keylogger if it is installed on your device. This gives the impression that parents can do this (if their children do not have receipts confirming that they bought the devices).
 

Ilushikwhu

New member
Joined
Feb 20, 2021
Messages
4
Как ответить в тему?
Может я делаю что то не так?
Прошу подсказать.
С уважением.
 
Top Bottom