In this blog, I'm going to discuss about keylogs and why they are malicious.
Keystroke logging, is the action of recording (logging) the keys struck on a keyboard, it can also be defined as a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which thus remains untouched. It effectively becomes a virtual machine.
A program on the machine obtains root access to hide itself in the OS and intercepts keystrokes that pass through the kernel.
Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus.
Legitimate programs may have akeylogging function which can be used to call certain program functions using “hotkeys ,” or to toggle between keyboard layouts (e.g. Keyboard Ninja).
There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track theactivity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.
It is more difficult, however, for users to combatkeyloggers ; the only possible method is to use an appropriate security solution, as it’s usually impossible for a user to tell that a keylogger has been installed on his/ her machine.
Keystroke logging, is the action of recording (logging) the keys struck on a keyboard, it can also be defined as a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which thus remains untouched. It effectively becomes a virtual machine.
A program on the machine obtains root access to hide itself in the OS and intercepts keystrokes that pass through the kernel.
Legitimate programs may have a
There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the
It is more difficult, however, for users to combat