Keyloggers

What is a Keylogger?

A keylogger is a software or a hardware tool that is used for keystroke logging. This practice refers to an action when every single key struck on a keyboard is recorded in secret. Usually, the person being monitored is not aware of it. A keylogger logs all the keystrokes in a file, and then it can upload this file to a predestined server.

There are many types of keyloggers out there, and they can be used for different purposes. Although initially, keylogger was not supposed to be a cybercrime tool, it did not take long for cybercriminals to apply keylogging in their daily activities, too.

Keylogger Types

Software vs. Hardware

The complexity of describing a keylogger lies in the fact that there are multiple types of keyloggers out there, and they could be classified based on several different variables. The most common classification is based on design. As such, there are software-based and hardware-based keyloggers.

Software keyloggers essentially are programs that get installed on a target computer. Depending on the classification, these applications may be further divided into programs that make use of a hooking mechanism and kernel or driver-based keyloggers.

The former will usually enter the computer as an executable file that launches the hook function. It is a legitimate Windows function else known as SetWindowsHookEx, and it is used to monitor your system for specific types of events. In order words, if a third-party application makes use of this system messaging mechanism, it can monitor your system and process the messages sent before they actually reach the appropriate target procedure. The difference between the hooking function-based and the kernel-based keyloggers is that the latter have the root access, and they can be virtually undetectable. In a sense, kernel-based keyloggers can be considered rootkits that can acquire illegal access to the hardware.

Hardware keyloggers, on the other hand, do not depend on any program or application to function because they work at a hardware level. That would be a specific device that records all the communication between your computer and your keyboard. Regular hardware keyloggers are placed somewhere in between the keyboard and computer, while there are also such hardware keylogger types as wireless keylogger sniffers, firmware, and keyboard overlays.

Legal vs. Illegal

Those who deal with malware on a daily basis are used to the malicious description of a keylogger, but the term itself is not malicious. It is only a program that is supposed to monitor someone’s activity. Therefore, there are both legal and illegal aspects of this software.

Legal keylogging programs might be used by employers to track the online activities of their employees in order to make sure that they do their job properly. Also, computer users may track their system activity via such programs in case their computers are used by third parties. What’s more, a keylogger may be a tool of parental control, enabling parents to track their children’s Internet activity. For the most part, these programs are supposed to ensure security in one way or the other. However, the thin ethical line between safety monitoring and downright spying makes keylogging a delicate subject.

The illegal use of keyloggers involves various types of cybercrimes. It can be used as a part of a trojan or a rootkit for data collection. Seeing how a keylogger can record all the keyboard input data, cybercriminals can intercept PIN codes, passwords, logins, email addresses, and other sensitive information without any difficulty. Such practice is highly dangerous both on the individual and corporate level, and that is why computer security experts advise users to perform regular system scans with security applications.

keylogger process

Keylogger Processes – Source: Researchgate.net

Examples of Keylogger Use in Cybercrime

There are many malicious infections that employ keyloggers, but to name just a few, perhaps we could start with the Predator Pain Keylogger that includes Browser, File, FTP, and Messenger stealers in its setup. This keylogger usually attacks online gamers, stealing passwords and usernames from Minecraft, Steam, and World of Warcraft users. According to extensive research, the program is usually distributed via infected USB flash drives or P2P websites.

A far more common type of infection that uses keylogging is a trojan. In this case, we could mention the Haxdoor Trojan. This malicious banking trojan appeared in 2006, and it was distributed via spam email messages that looked like legitimate notifications from a bank. This backdoor trojan with rootkit capabilities would collect banking usernames, passwords, credit card information, login details, and other financial information. With this data, the people behind this infection could steal millions of dollars from unsuspecting users.

Another good example of a trojan that employed keylogging is the notorious Zeus Trojan or Trojan.Zbot that was first discovered in 2010. The goal of this infection is to steal confidential information from the affected computer. Zeus Trojan usually spreads around via spam tools and drive-by downloads. Email messages that distribute this infection usually look like they have been sent from MySpace, Microsoft, Facebook, or any other reliable platform. Users are urged to click a link in the message, and once they do that, they get infected with the trojan. According to various security reports, the Zeus Trojan usually targets banking information, but it can be easily customized to steal other data as well.

Keylogger Distribution Method

Aside from the cases when keyloggers are installed legally for company security, parental control, or other justifiable purposes, the malicious infections with the keylogging function spread just like any other malware program out there. The distribution methods can be mainly grouped into four categories:

  • spam email
  • browser vulnerability exploit
  • malicious program
  • installer file on a P2P network

In the case of spam email, users get infected with keyloggers when they open the file attached to the message or click the embedded link. Browser vulnerability exploit refers to a method of malware distribution when the program download is launched automatically once the user visits the infected page. By “malicious program” in the third distribution method, we mean a situation when a keylogger is downloaded to your system by a malicious application that has already been running on your PC. Usually, trojans are able to connect to the Internet behind your back and download more unwanted programs. Finally, a keylogger may also enter your computer when you open its installer file on a P2P network. With this, we can see that when it comes to avoiding this type of threat, a lot depends on the users themselves.

How to Avoid Malicious Keyloggers?

The most efficient way to protect yourself from this and other types of infections is by installing a licensed anti-malware application. If your computer security tool is up-to-date, it will have all of the currently detected keyloggers in its definition database, and it will be able to intercept them immediately.

Users should also consider using one-time passwords, two-factor authentication, and virtual keyboards when they need to enter sensitive data. You should especially consider it when you use a third-party or a public computer. When it comes to keyloggers, it is not so much your computer that you should be worried about, but your personal information!

Most Trending Keyloggers in the Last 2 Weeks

# Threat Name Severity Level Alias(es) Detections
1. SaveKeys 80 % (High) 2
2. Mal/Banspy-K
3. Spyware.GoldenEye 80 % (High) Logger.CYT
Win-AppCare/Xema.970752
Monitor/Win32.GoldenEye.gen
35
4. Keylogger.CyberSitter 80 % (High) 180
5. Keylogger.Elite Keylogger 80 % (High) 191
6. IamBigBrother 60 % (Medium)
7. Golden Keylogger 100 % (High) Trj/CI.A
probably unknown NewHeur_PE
Heuristic.LooksLike.Win32.SuspiciousPE.K
8. 404 Keylogger
9. BlazingTools Perfect Keylogger 80 % (High) Riskware/UltraSurf
SPR/UltraSurf.t
Trojan.DownLoader2.61367
14
10. Kutaki Keylogger
11. MonitoringTool.Ardamax 80 % (High) Win32/KeyLogger.Ardamax.NAB
Riskware.Ardamax.C
Non-Virus:Monitor.Win32.Ardamax.c
29
12. Hooker Trojan Keylogger
13. Actual Spy
14. Keylogger.SpyAgent 80 % (High) PAK_Generic.001
Downloader
Mal/Generic-A
882
15. Keylogger Zeus
16. Spyrix
17. Grind3lwald RAT
18. FreeKeylogger 80 % (High) Logger.OEQ
FreeKeyLogger
Trojan.KeyLogger.9239
498
19. NeoSpy 80 % (High) 1,127
20. Trojan-PWS.Win32.VB PWS:Win32/OnLineGames.GE
Trojan-PSW.Win32.VB.bba
Trojan Horse
21. MicTrayDebugger
22. Trojan-Spy.Carberp 90 % (High) 1,046,412
23. Ardamax Keylogger 80 % (High) ArdamaxKeylogger
not-a-virus:Monitor.Win32.Ardamax.24
Not-A-Virus.Monitor.Win32.Ardamax.24
24. Keylogger.Revealer 80 % (High) Revealer Free Edition
Trj/Keylog.LH
not-a-virus:Monitor.Win32.RevealerKeylogger.b
12,763
25. KGB Keylogger
26. Hack99 80 % (High) 387
27. SC-KeyLog 80 % (High) 27
28. Perfect Keylogger 90 % (High) Application/PerfectKeyLog.AP
Logger.ATT
Win-Trojan/Keylogger.405504
2
29. S-400 RAT

Last updated: 2024-04-24

Keyloggers List

Threat Name Severity Level Detections
'Taxve Inc.' Email Virus
123Keylogger 80 % (High) 4
404 Keylogger
AceSpy 60 % (Medium) 0
Achtung! 80 % (High) 12
Actions Monitor 80 % (High) 50
Activity Monitor 80 % (High) 83
Actual Spy
ACXInstall 70 % (High) 2
AGM65s Keylog trojan
All In One Keylogger 80 % (High) 3
Aobo Keylogger
Application.Actual_Keylogger 80 % (High) 5,716
Application.Family_Keylogger 80 % (High) 1
Application.WinSpy_Stealth_Monitor
Application.WinSpy_Stealth_Monitor Virus
Ardamax Keylogger 80 % (High) 0
Atomic Log 80 % (High) 14
Black Box AOL Logger 80 % (High) 13
BlazingTools Perfect Keylogger 80 % (High) 14
Boolosoft Keylogger 80 % (High) 0
CheaterChecker 10 % (Normal) 2,044
Cyber Snoop
DesktopSnooper 80 % (High) 1
Enfiltrator Black Box 50 % (Medium) 0
1 2 3 4 5 6 8
Loading...