- Remotely executing malicious programs designed to steal information, crack passwords, install backdoor, and so on.
- Next step after gaining access and elevating privileges.
- Programs that attackers install include
- Software or hardware device designed to
- record every keystroke on the target's keyboard
- logs them into a file
- sends them to a remote location
- Used for monitoring employee and children computer activity
- Allow gathering confidential information including emails and passwords.
- Two types: hardware keylogger and software keylogger
- Look like USB drives and are designed to record keystrokes, which are stored on the device.
- Placed between a keyboard plug and USB socket
- Cannot be detected by anti-spyware or antivirus programs.
- Discoverable as they have to be physically placed onto a target's machine
- PC/BIOS Embedded
- Modifying the BIOS level firmware to capture the keystrokes
- Keylogger keyboard
- Attaching the hardware circuit with the keyboard cable connector
- External keylogger
- Attaching the keylogger between a keyboard and computer.
- E.g. PS/2 and USB Keylogger, Acoustic/CAM Keylogger, Bluetooth Keylogger, and Wi-Fi Keylogger.
- Installed on the target's machine
- Recorded keystrokes are
- logged into a log file on the target's machine
- then sent to the attacker using email protocols
- Application keylogger
- Designed to observe the target's activity whenever type something.
- It can record emails, passwords, messages, browsing activities, and so on.
- Kernel keylogger
- Designed to exist on a kernel level and act as a keyboard device driver
- Allows it to record everything that is typed on the keyboard
- Rootkit keylogger
- Forged Windows device driver which records keystrokes
- Device driver keylogger
- Designed to replace the driver that has the keylogging functionality
- Logs the keystrokes, and send the file to a remote location
- Hypervisor-based keylogger
- Designed to work within a malware hypervisor that is operating on the OS
- Form grabbing based keylogger
- Designed to record web browsing when the Submit event is triggered
- Stealthy program designed to
- record the target's interaction with the computer and Internet
- send the recorded data to the attacker
- Able to take and send screenshots.
- Hidden when installed.
- Desktop spyware
- Email spyware
- Internet spyware
- Child-monitoring spyware
- Screen-capturing spyware
- USB spyware
- Audio and video spyware
- Print spyware
- Telephone spyware
- GPS spyware