A keylogger is a computer program that logs each keystroke on a keyboard and saves this data into a file. Once it collects the needed amount of data, it transfers it via the Internet to a predetermined remote host. It also can capture screenshots and use other techniques for tracking user's activity. Keylogger can cause the loss of passwords, login data, and similar information.

There are two types of keyloggers: the hardware and the software. The hardware keylogger is a small physical device that can be dropped between the keyboard’s plug and the computer’s keyboard port. A hardware keylogger records all keystrokes and saves them into own memory. Such device does not rely on a particular software or a driver. Therefore, it can work under different environments. However, it does not take screenshots and can be easily found during a thorough computer inspection.Software keyloggers are divided into parasitical and legitimate applications.

Malicious keyloggers are very similar to viruses and trojans. They are used by hackers to violate user privacy. Legitimate keyloggers, also known as computer surveillance tools, are commercial products targeted mostly to parents, employers and teachers. They allow to find out what children or employees are doing online. However, even legal programs work without the monitored user’s knowledge and consent. They can also be used by malicious persons and, therefore, are not classified as less harmful threats than the certain parasites.

Dangerous activities that can be initiated by the Keylogger

Practically all keyloggers seek to violate user's privacy. They can track their victims for months and even years until they are noticed. During all this time, a regular keylogger is capable of finding out as much information about the user as possible. Someone who controls a keylogger gets priceless information, including passwords, login names, credit card numbers, bank account details, contacts, interests, web browsing habits and much more. All this information can be used to steal victim's personal documents and the money.

To sum up, a regular keylogger is capable of initiating these activities:

  • Logging keystrokes on the keyboard.
  • Taking screenshots of user's activity on the Internet at predetermined time intervals.
  • Tracking user's activity by logging window titles, names of launched applications, and other specific information.
  • Monitoring user's online activity by recording addresses of visited websites, entered keywords and other similar data.
  • Recording login names, details of various accounts, credit card numbers and passwords.
  • Capturing online chat conversations on instant messengers.
  • Making unauthorized copies of outgoing and incoming e-mail messages.
  • Saving all collected information into a file on a hard disk, and then silently sending this file to a required e-mail address.
  • Complicating its detection and removal.

Keyloggers cannot be compared with regular computer viruses. They do not spread themselves as these threats do and, in most of the cases, must be installed as any other software.

The major ways that are used by Keyloggers to infiltrate the system:

There are two methods that are used by the keystroke logging program to get into the system. Here are both of them:

  • A legitimate keylogger can be manually installed on the system by its administrator or any other user who has needed privileges for this activity. A hacker can break into the system and setup his keylogger. In both cases, a privacy threat gets installed on the system without user’s knowledge and consent.
  • Malicious keyloggers can be installed on the system with the help of other parasites, such as viruses, trojans, backdoors or other malware. They get into the system without user's knowledge and affect everybody who uses a compromised computer. Such keyloggers do not have any uninstall functions and can be controlled only by their authors or attackers.

In most of the cases, keyloggers affect computers running Microsoft Windows operating system. However, all viruses are constantly updated, so there is no guarantee that they are not capable of hijacking other popular platforms.

The most dangerous threats of this type that are spreading online

There are lots of different keystroke logging applications, both commercial and parasitical. The following examples illustrate typical keylogger behavior.

AllInOne Keylogger is a malicious program targeted at PC users and their personal information. Typically, people who work behind it, seek to steal as much information as possible. AllInOne KeyLogger is designed to record all user's keystrokes, take the screenshots and initiate other activities. You can hardly notice this threat on your computer as it hides deep inside the system. 

Invisible Stealth Keylogger is the harmful trojan horse with keystroke-logging functions. This parasite not only records every user's keystroke but also gives the opportunity for the remote attacker to have unauthorized access to a compromised computer. He or she can easily download and execute arbitrary code, steal user’s vital information (passwords, e-mail messages or bank account details). Once it collects needed amount of data, this threat sends it to the attacker through a background Internet connection. Moreover, they can cause general system instability and even corrupt files or installed applications.

Perfect Keylogger is a complex computer surveillance tool with rich functionality. It records all user keystrokes and passwords, takes screenshots, tracks user activity on the Internet, captures chat conversations and e-mail messages. Perfect Keylogger can be remotely controlled. It can send gathered data to a configurable e-mail address or upload it to a predefined FTP server. Although it is a commercial product, it’s even more dangerous than most parasitical keyloggers.

How to remove keylogger and fix the affected PC system

Unfortunately, but there is no method for retrieving stolen data. That's why you should remove the keylogger from your computer as soon as possible. This can be done using a reliable anti-spyware. In order to avoid the loss of legitimate programs that are important for stable PC's functionality, we recommend using one of these programs:SpyHunter, Malwarebytes Anti Malware. Each of them was tested by our security experts and have been approved to have an extensive parasite signature database. If you have any question related to Keylogger removal, you can share your question with us using the Ask Us page. We will be glad to help you solve your problems.

Newest Keyloggers

Sinred Keylogger removal

May 31st, 2015. From the publisher: 'Sinred Keylogger 1.0 simply loggs on and offline keys and sends logs to the specified e-mail.' Variants: Sinred Keylogger 1.0, Sinred Keylogger 1.1 More...

Removal of RundlI

May 31st, 2015. From the publisher: 'just run it ... it logs to C:\tripper.com and sits in the task list as a second instance of Rundll ... so people are less likly to kill it off ! (I could hide it totaly from the task list but then it's hard to remove tripper.com without becoming obvious) In the next version... More...

Uninstalling Professional Spy KeyLogger

May 31st, 2015. From the publisher: 'This App is a spy application, because it works hidden,and it intercept all digited keys, the intercepted keys are saved in a Text File named 'Save.txt'.' More...

DATABASE OF Keyloggers PARASITES

Total Keyloggers parasites in our DB: 220


    1
  • 007 Spy Software December 3rd, 2011 | 5 Comments
    007 Spy Software is a commercial computer surveillance product that tracks user activity, logs all keystrokes,...

  • 007 Starr March 26th, 2005 | No Comments
    007 Starr is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out ...

  • Absolute Key Logger January 15th, 2012 | No Comments
    Absolute Key Logger is a commercial computer surveillance program that logs all user keystrokes and records pa...

  • Active Monitor December 2nd, 2004 | No Comments
    From the publisher: 'This is an application for real time monitoring of users activities on network computers ...

  • ActiveVB KeyLogger January 8th, 2008 | 4 Comments
    ActiveVB KeyLogger is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, s...

  • Activity Logger October 1st, 2005 | 5 Comments
    Activity Logger is a commercial computer surveillance program that tracks user activity, logs all keystrokes a...

  • Advanced Call recorder November 16th, 2004 | No Comments
    From publisher: 'Advanced Call Recorder records telephone conversations to your computer's hard disk. It store...

  • AGM65s Keylog trojan December 2nd, 2004 | No Comments
    From publisher: 'V 1.0 Features: - It sends the keylogger data to a choosen ftp after the target is 45 mins on...

  • Akosch Keylogger June 28th, 2004 | No Comments
    From the publisher: 'PHP-site generate the HTML-sites, where the strings are. The KeyLogger changes the start...

  • Aku Key Logger January 25th, 2010 | 2 Comments
    From the publisher: 'Key Logger 1.1 Created by Aku Freeware Key Logger v1.1 logs keystrokes and mouse clic...

  • AllInOne Keylogger July 11th, 2014 | No Comments
    AllInOne Keylogger is a very untrustworthy application that is used in order to spy on people. Usually, such k...

  • Ardamax Keylogger May 11th, 2012 | 14 Comments
    Ardamax Keylogger is a commercial system surveillance tool that tracks user activity and records all keystroke...

  • BEEE June 28th, 2004 | No Comments
    BEEE is keylogger made by IOpus Software group in September, 2002. Better Email Enable Everything.

  • Belkin PCSpy April 6th, 2004 | 1 Comments
    Belkin pcspy , as any professional Keylogger, records every keystroke and stays undetectable. Additionally b...

  • Beyond Keylogger July 28th, 2005 | No Comments
    Beyond Keylogger logs keystrokes, takes screenshots, tracks user activity in the Internet and records micropho...

  • BlazingTools Perfect keylogger June 21st, 2005 | No Comments
    The program runs in system tray mode, although, can be swiched to be hidden from view. It logs all keystrokes,...

  • Captain Mnemo Pro August 13th, 2005 | No Comments
    Captain Mnemo Pro is a commercial application designed to monitor user activity, log keystrokes, record login ...

  • Capture.dll June 28th, 2004 | No Comments
    Capture.dll is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends...

  • Catch Cheat Spy 1.4 April 6th, 2004 | No Comments
    Catchcheat features: Read e-mail that is sent and received by the computer you will be monitoring. You can...

  • Cheat Monitor April 21st, 2010 | 2 Comments
    Cheat Monitor keylogger is a very dangerous infection. Although it doesn’t do harm on its own, CheatMonitor ...

  • CLogger March 7th, 2005 | No Comments
    CLogger is AOL keylogger made by Creber in August, 2002.

  • CompuSpy November 20th, 2008 | No Comments
    CompuSpy is a professional spy watching everything you do when you are using infected computer. Compu Spy is a...

  • Conducent September 24th, 2013 | 2 Comments
    Conducent is a misleading application, which infiltrates computers in a bundle with other programs. For avoidi...

  • Covenanteyes October 27th, 2011 | 7 Comments
    From the publisher: 'When people of all ages are on the Internet, there is very little accountability in rega...

  • CQMA June 28th, 2004 | No Comments
    CQMA is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out logs ...

  • Cummings Keylogger 2.0 June 28th, 2004 | No Comments
    Cummings KeyLogger records all keyboard entries at chosen intervals. From the publisher: 'Keylogger is ...

  • Desktop Surveillance September 7th, 2005 | No Comments
    Desktop Surveillance is a commercial monitoring product that tracks user activity, logs all keystrokes, contin...

  • DGSSSoftware keylogger December 2nd, 2004 | No Comments
    From the publisher: 'Invisible logging of all keystrokes and window titles to a log file. Useful to find ou...

  • DKS KeySpy June 28th, 2004 | No Comments
    From the publisher: 'The program 'Dks v.1.3.1' is intended for tracking of pressing all keys in a system and ...

  • Dr Modem May 30th, 2015 | No Comments
    Dr Modem is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out l...

  • Dreamscape Keylogger May 30th, 2015 | No Comments
    Dreamscape Keylogger is keylogger made by Dreamscape Keylogger in May, 2001.

  • DSK Lite 1.0 June 28th, 2004 | No Comments
    From the publisher: 'DSK - Lite v1 is coded in visual basic 6.0 using winsock API Removing the need forthe de...

  • DyFuCA.SafeSurfing July 28th, 2004 | No Comments
    DyFuCA.SafeSurfing is keylogger made by Avenue Media group in June, 2003.

  • EarSpy March 24th, 2006 | No Comments
    EarSpy is a commercial computer surveillance program that tracks user activity, logs keystrokes and captures s...

  • EBlaster May 29th, 2015 | 14 Comments
    Eblaster is designed to spy activities on the computer infected with eblaster. eBlaster can record emails, cha...

  • EBlaster 5.0 July 17th, 2005 | No Comments
    Eblaster 5.0 is a newer version of well known parasite Eblaster. eBlaster can record emails, chats, instant ...

  • Ehks May 30th, 2015 | No Comments
    Variants: Ehks 2.0, Ehks 2.1, Ehks 2.2 From the publisher: -= ev0luti0n HTTP keylogger 2.0 beta =- ~ ex...

  • Elfrah PCSpy August 3rd, 2005 | No Comments
    Elfrah PCSpy is not an actual parasite, but a legitimate commercial product. However, it can be used for obvio...

  • EliteKeylogger July 20th, 2005 | 2 Comments
    EliteKeylogger is made by WideStep Security Software. It is not a parasite. However, it can be used by hackers...

  • EMA Info Grabber June 28th, 2004 | No Comments
    From the publisher: 'This little program is a great way to retrieve info about what people are doing on their...

  • Enfiltrator Black Box May 30th, 2015 | No Comments
    From the publisher: 'eNFILTRATOR Black Box Home Edition (eBBHE) is a complete computer monitoring solution fo...

  • EVision Megapro May 30th, 2015 | No Comments
    EVision Megapro is keylogger made by eVision in February, 2003.

  • Evolution HTTP keylogger December 2nd, 2004 | No Comments
    This keylogger records all the keystrokes in a file, and allows to view them from a distant computer just by t...

  • Exploit Child Watchdog October 12th, 2005 | No Comments
    Exploit Child Watchdog is a commercial computer monitoring program that tracks user activity, logs all keystro...

  • Fearless KeySpy May 30th, 2015 | No Comments
    Variants: Fearless KeySpy 1.0, Fearless KeySpy 1.1b, Fearless KeySpy 2.0 From the publisher: FKS is a keylog...

  • Gkllite May 30th, 2015 | No Comments
    Gkllite is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out lo...

  • GlobalHook Keylogger May 30th, 2015 | No Comments
    GlobalHook Keylogger is keylogger made by Konstantin Tretyakov in September, 2000.

  • GOD Remote Keylogger May 30th, 2015 | No Comments
    Variants: GOD Remote Keylogger 1.0, GOD Remote Keylogger 2.0 beta 9 GOD Remote Keylogger is keylogger made by...

  • Golden Eye August 6th, 2005 | No Comments
    Golden Eye is a commercial keylogger that records keystrokes, tracks user activity and takes screenshots. Alth...

  • GP KeySpy 5.1 May 30th, 2015 | No Comments
    From the publisher: 'Ein Keylogger der Extra klasse. High stealth - verteckt sich im Taskmanager unter Win9x ...

1 | | 3 | 4 | 5 | NEXT

Like us on Facebook