Keyloggers

Total Keyloggers parasites in our DB: 545
Keyloggers added today: 0
 
 

WHAT IS A KEYLOGGER?

A keylogger is a computer program that logs each keystroke a user types on a keyboard and saves this data into a file or transfers it via the Internet to a predetermined remote host. It also can capture screenshots of user activity, log passwords, record online chat conversations or take different actions in order to find out what a user is doing. A keylogger poses the most dangerous threat to user privacy.

A keylogger can be also a small physical device that usually is placed between the keyboard’s plug and the computer’s keyboard port. A hardware keylogger records all keystrokes and saves them into own memory. Such a device doesn’t rely on a particular software or driver and therefore works under different environments. However, it doesn’t take screenshots and can be easily found during a thorough computer inspection.

Software keyloggers are divided into parasitical and legitimate applications. Malicious keyloggers are very similar to viruses and trojans. They are used by hackers to violate user privacy. Legitimate keyloggers, also known as computer surveillance tools, are commercial products targeted mostly to parents, employers and teachers. They allow to find out what children or employees are doing online. However, even legal programs work without the monitored user’s knowledge and consent. They can be also used by malicious persons and therefore are not classified as less harmful threats than the actual parasites. Navigate to keylogger parasites

Newest Keyloggers

AllInOne Keylogger

July 11th, 2014
AllInOne Keylogger is a very untrustworthy application that is used in order to spy on people. Usually, such keyloggers are used in order to monitor who is using a computer. Furthermore, this dubious application has a feature to record keystrokes and even take screenshots every couple of seconds. If you... More...

Conducent

September 24th, 2013
Conducent is a misleading application, which infiltrates computers in a bundle with other programs. For avoiding it, you should remember that in may come on your machine with free applications that are usually filled with additional downloads. This is done for monetization only and it can be avoided by eliminating... More...

SpyGraphica

May 20th, 2012
SpyGraphica is a commercial computer surveillance program that logs keystrokes and takes screenshots of user activity. It sends gathered data to a configurable e-mail address. SpyGraphica must be manually installed. It automatically runs on every Windows startup.... More...

DATABASE OF Keyloggers PARASITES

# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
    6
    1
  • WebPI August 8th, 2005 No Comments
    WebPI is a commercial keylogger that records all user keystrokes and captures screenshots. Logged data is saved on a ...
  • 007 Spy Software December 3rd, 2011 5 Comments
    007 Spy Software is a commercial computer surveillance product that tracks user activity, logs all keystrokes, takes scr...
  • 007 Starr March 26th, 2005 No Comments
    007 Starr is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out logs by FT...
  • 123 P?? Spy December 2nd, 2004 No Comments
    From the publisher: '123 PC Spy is a powerful while easy-to-use spy utility that runs stealthly under MS Windows. This s...
  • 2Spy October 1st, 2005 No Comments
    2Spy is a commercial keylogger that tracks user activity, logs all keystrokes and records mouse clicks. Gathered informa...
  • A Keylogger July 19th, 2005 1 Comments
    From the publisher: 'It logs every keystroke the user types, independent of the application they are using.'
  • AB System Spy August 1st, 2005 No Comments
    AB System Spy is a keylogger with additional functionality. It records all user keystrokes, takes screenshots, monitors ...
  • ABCKeylogger September 24th, 2005 No Comments
    ABCKeylogger records all keystrokes and captures screenshots of user activity. Gathered data is saved to a hard disk. Th...
  • Absolute Key Logger January 15th, 2012 No Comments
    Absolute Key Logger is a commercial computer surveillance program that logs all user keystrokes and records passwords. G...
  • AceSpy September 14th, 2005 No Comments
    AceSpy is a powerful commercial computer surveillance program that tracks user activity, logs all keystrokes, takes scre...
  • Actions Monitor April 5th, 2004 No Comments
    Actions Monitor is a Windows based application designed to monitor, display and save all file system activity on a syste...
  • Active Key Logger August 6th, 2005 No Comments
    Active Key Logger is a commercial product that records all user keystrokes and sends gathered data to a configurable e-m...
  • Active Monitor December 2nd, 2004 No Comments
    From the publisher: 'This is an application for real time monitoring of users activities on network computers and for em...
  • ActiveVB KeyLogger is keylogger which can logs keystrokes, takes and sends out screenshots of user activity, sends out l...
  • Activity Keylogger August 3rd, 2005 No Comments
    Activity Keylogger is not an actual parasite, but a legitimate commercial product. However, it can be used for obvious m...
  • Activity Logger October 1st, 2005 5 Comments
    Activity Logger is a commercial computer surveillance program that tracks user activity, logs all keystrokes and capture...
  • ActMon October 2nd, 2005 No Comments
    ActMon is a computer monitoring program that tracks user activity, logs all keystrokes, takes screenshots, captures onli...
  • Advanced Call recorder November 16th, 2004 No Comments
    From publisher: 'Advanced Call Recorder records telephone conversations to your computer's hard disk. It stores calls as...
  • Advanced Computer Monitor September 7th, 2005 No Comments
    Advanced Computer Monitor is a commercial computer surveillance program that can be used to track user activity, log all...
  • Advanced Keylogger January 14th, 2012 No Comments
    Advanced Keylogger is a powerful commercial computer surveillance program that tracks user activity, logs all passwords,...
1 | | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | NEXT

WAYS OF INFECTION

Keyloggers differ from regular computer viruses. They do not spread by themselves and usually must be installed as any other software with or without user content. There are two major ways unsolicited keystroke logging program can get into the system.

1. A legitimate keylogger can be manually installed by system administrator or any other user who has sufficient privileges for the software installation. A hacker can break into the system and setup own keylogger. In both cases a privacy threat gets installed without the monitored user’s knowledge and consent.
2. Malicious keyloggers often are installed by other parasites like viruses, trojans, backdoors or even spyware. They get into the system without user knowledge and affect everybody who uses a compromised computer. Such keyloggers do not have any uninstall functions and can be controlled only by their authors or attackers.

Keyloggers affect mostly computers running Microsoft Windows operating system. However, some less prevalent parasites can be also found on other popular platforms.

WHAT A KEYLOGGER DOES?

- Logs each keystroke a user types on a computer’s keyboard.
- Takes screenshots of user activity at predetermined time intervals or when a user types a character or clicks a mouse button.
- Tracks user activity by logging window titles, names of launched applications, exact time of certain event occurrence and other specific information.
- Monitors online activity by recording addresses of visited web sites, taken actions, entered keywords and other similar data.
- Records login names, details of various accounts, credit card numbers and passwords including those hidden by asterisks or blank space.
- Captures online chat conversations made in popular chat programs or instant messengers.
- Makes unauthorized copies of outgoing and incoming e-mail messages.
- Saves all collected information into a file on a hard disk, then silently sends this file to a configurable e-mail address, uploads it to a predefined FTP server or transfers it through a background Internet connection to a remote host. Gathered data can be encrypted.
- Complicates its detection and removal by hiding active processes and concealing installed files. The uninstaller, if it exists, usually refuses to work if a user cannot specify a password.

EXAMPLES OF KEYLOGGERS

There are lots of different keystroke logging applications, both commercial and parasitical. The following examples illustrate typical keylogger behavior.

Family Key Logger is a relatively simple commercial keylogger targeted to parents who need to know what kids are doing online while they are not at home and to users who want to spy on their spouses. Family Key Logger is designed to record all user keystrokes. It doesn’t have additional functionality and must be manually installed. Most legitimate keyloggers are quite similar to Family Key Logger and therefore are not extremely dangerous.

Delf is the entire family of harmful trojans with keystroke logging functions. These parasites not only record every user keystroke, but also give the remote attacker full unauthorized access to a compromised computer, download and execute arbitrary code, steal user’s vital information such as passwords, e-mail messages or bank account details. Delf threats send all gathered data to the attacker through a background Internet connection. Moreover, they can cause general system instability and even corrupt files or installed applications.

Perfect Keylogger is a complex computer surveillance tool with rich functionality. It records all user keystrokes and passwords, takes screenshots, tracks user activity in the Internet, captures chat conversations and e-mail messages. Perfect Keylogger can be remotely controlled. It can send gathered data to a configurable e-mail address or upload it on a predefined FTP server. Although it is a commercial product, it’s even more dangerous than most parasitical keyloggers.

CONSEQUENCES OF A KEYLOGGER INFECTION

Practically all keyloggers are very difficult to detect. They can violate user privacy for months and even years until the user will notice them. During all this time a regular keylogger is able to find out everything about the user. Someone who controls a keylogger gets priceless information including the monitored user’s passwords, login names, credit card numbers, exact bank account details, contacts, interests, web browsing habits and much more. All this information can be used to steal victim's valuable personal documents, money, use his name, address and other identity data for criminal offences.

HOW TO REMOVE A KEYLOGGER?

Most keyloggers work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. Some advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove keyloggers and related components. Powerful anti-spyware solutions such as Microsoft AntiSpyware Beta, Spyware Doctor, Ad-Aware SE, SpyHunter, eTrust PestPatrol or Spybot - Search & Destroy are well-known for perfect keylogger detection and removal capabilities.

In some cases even an antivirus or spyware remover can fail to get rid of a particular keylogger. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.

Not all keyloggers (even if they track your personal information) are illegitimate and needed to remove immediately.

Additional resources related to Keyloggers:

Attention: If you know or you have a website or page about Keyloggers removal, feel free to add a link to this list: add url



more resources

Spreading the knowledge:

It is very hard to fight against computer parasites on the Internet alone. If you have a website, we would be more than happy if you would like to cooperate and help us spread the information about latest threats. Remember, knowledge is the most powerful weapon. Help your visitors protect their computers!
add text box
rss feed
help other
Like us on Facebook
Latest spyware news:
Subscribe to spyware news
Please enter your e-mail address:
If you do not want to receive our spyware
newsletter please unsubscribe here
48602 Subscribers
Ask us