Keyloggers

Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard. There are currently two types of keylogging methods, hardware and software based.

Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in.

When used covertly inline devices are easily detected by a glance at the keyboard connector plugged into the computer. Of the three types, the most difficult to install is also the most difficult to detect. The device that installs inside a keyboard (presumably the keyboard the target has been using all along) requires soldering skills and extended access to the keyboard to be modified. However, once in place, this type of device is virtually undetectable unless specifically looked for.

Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:

  • Data is uploaded to a website or an ftp account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.

How Can You Detect Keyloggers? Check for Keyloggers with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Keyloggers as well as a one-on-one tech support service.

* Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read our EULA, Privacy Policy & Special Discount Terms. See more Free SpyHunter Remover details.

There are currently 102 articles listed on keyloggers.

Name Threat Level Detection Count Date
H@tKeysH@@k January 30, 2014
Hack99 88/10 277 April 5, 2005
HawkEye Keylogger 88/10 104 September 7, 2016
HeurEngine.Packed-MaskPE January 11, 2011
Hooker Trojan Keylogger September 1, 2009
IamBigBrother 66/10 0 June 14, 2008
Incredible Keylogger 66/10 6 October 18, 2007
Ispy 88/10 0 July 24, 2009
iSpy Keylogger 88/10 0 October 19, 2016
KeyBase Keylogger 88/10 241 June 11, 2015
Keylog-Perfect February 25, 2011
Keylogger Zeus August 16, 2011
Keylogger.007SpySoft 88/10 8 September 30, 2009
Keylogger.AgentTesla 88/10 1,068 November 28, 2019
Keylogger.Cyborg 88/10 0 December 6, 2016
Keylogger.Foda 88/10 0 November 28, 2019
Keylogger.Fs0ciety 88/10 2 October 26, 2016
Keylogger.Hakops 88/10 217 November 28, 2019
Keylogger.Kelopol 88/10 23 November 28, 2019
Keylogger.KeyLogger.ac 88/10 5 June 24, 2011
Keylogger.MGShadow 66/10 10 October 30, 2007
KeyLogger.MSIL 88/10 171 November 28, 2019
Keylogger.Neptune 88/10 45 November 28, 2019
Keylogger.PCSpy.f 88/10 0 December 24, 2009
Keylogger.PCTattletale.a 88/10 0 April 22, 2011

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9