Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard. There are currently two types of keylogging methods, hardware and software based.
Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in.
When used covertly inline devices are easily detected by a glance at the keyboard connector plugged into the computer. Of the three types, the most difficult to install is also the most difficult to detect. The device that installs inside a keyboard (presumably the keyboard the target has been using all along) requires soldering skills and extended access to the keyboard to be modified. However, once in place, this type of device is virtually undetectable unless specifically looked for.
Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:
- Data is uploaded to a website or an ftp account.
- Data is periodically emailed to a pre-defined email address.
- Data is wirelessly transmitted by means of an attached hardware system.
- It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.
How Can You Detect Keyloggers? Check for Keyloggers with SpyHunter!SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Keyloggers as well as a one-on-one tech support service. Download SpyHunter’s Malware Scanner
to Detect Keyloggers.
There are 84 articles listed on keyloggers.
|Name||Threat Level||Detection Count||Date|
|123Keylogger||8/10||11||May 13, 2009|
|AceSpy||6/10||1||May 15, 2009|
|Actual Spy||May 15, 2009|
|ACXInstall||7/10||60||May 15, 2009|
|AGM65s Keylog trojan||March 28, 2012|
|Application.Actual_Keylogger||August 5, 2010|
|Application.Family_Keylogger||8/10||11||March 28, 2011|
|Application.WinSpy_Stealth_Monitor||August 12, 2010|
|Application.WinSpy_Stealth_Monitor Virus||June 21, 2011|
|Ardamax Keylogger||8/10||137||August 17, 2012|
|Boolosoft Keylogger||8/10||May 13, 2009|
|CheaterChecker||8/10||May 13, 2009|
|Cyber Snoop||August 4, 2009|
|Enfiltrator Black Box||8/10||April 12, 2012|
|Fade.exe||May 28, 2015|
|FamilyKeyLogger||8/10||324||September 29, 2009|
|Force Keylogger||May 15, 2009|
|FreeKeylogger||8/10||9,531||May 13, 2009|
|Gen.Variant.MSILKrypt||March 2, 2011|
|Generic Keylogger.ai||9/10||2,856||April 1, 2011|
|Generic.dx!nug||March 25, 2011|
|Golden Keylogger||10/10||11||October 26, 2015|
|H@tKeysH@@k||January 30, 2014|
|Hack99||8/10||652||August 17, 2012|
|HawkEye Keylogger||8/10||304||September 7, 2016|
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9