A key logger can be hardware-based of software-based.

APPLICATION SECURITY

Knowledge Base

Search Our Knowledge Base

AppSec Knowledgebase Categories >

Keyloggers: Detectors, PC Monitors, Keylogger Software, What Is a Keylogger

What Is a Keylogger?

Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked. Keyloggers can be used for a variety of purposes; hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities. Some keyloggers can also capture your screen at random intervals; these are known as screen recorders. Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.

How Does a Keylogger Get on Your Computer?

A keylogger can be installed on your computer any number of ways. Anyone with access to your computer could install it; keyloggers could come as a component part of a virus or from any application installation, despite how deceptively innocent it may look. This is part of the reason why you should always be sure you’re downloading files from a trusted resource.

Keylogger Software

Remot- access software keyloggers can allow access to locally recorded data from a remote location. This communication can happen by using one of the following methods:

  • Uploading the data to a website, database or FTP server.
  • Periodically emailing data to a predefined email address.
  • Wirelessly transmitting data through an attached hardware system.
  • Software enabling remote login to your local machine.

Additional features that some software keyloggers come with can capture additional information without requiring any keyboard key presses as input. They include:

  • Clipboard logging – Anything that can be copied to the clipboard is captured.
  • Screen logging – Randomly timed screenshots of your computer screen are logged.
  • Control text capture – The Windows API allows for programs to request the text value of some controls, meaning that your password may be captured even if behind a password mask (the asterisks you see when you type your password into a form).
  • Activity tracking – Recording of which folders, programs and windows are opened and also possibly screenshots of each.
  • Recording of search engine queries, instant message conversations, FTP downloads along with any other internet activities.

Keylogger Hardware

Hardware-based keyloggers can monitor your activities without any software being installed at all. Examples of these include:

  • Keyboard hardware - These loggers take the form of a piece of hardware inserted somewhere between the computer keyboard and the computer, typically along the keyboard's cable connection. There are of course more advanced implementation methods that would prevent any device from being visible externally. This type of hardware keylogger is advantageous because it is not dependent on any software nor can it be detected by any software.
  • Wireless keyboard sniffers - It is possible for the signals sent from a wireless keyboard to its receiver to be intercepted by a wireless sniffer.
  • Keyboard overlays - Overlays are popular in ATM theft cases where thieves capture a user's PIN number. This device is designed to blend in with the machine so that people are unaware of its presence.

How Can I Detect and Remove a Keylogger?

There are a variety of ways to detect a keylogger, though none are a catchall, so if you have reason to suspect your computer has a keylogger, we recommend trying a variety of these tactics:

  • Begin by running your antivirus, which can often detect a keylogger on your system.
  • Run a program like Spybot Search and Destroy or MalwareBytes to check for certain types.
  • Check your task list by pressing ctrl+alt+del in Windows. Examine the tasks running, and if you are unfamiliar with any of them, look them up on a search engine.
  • Scan your hard disk for the most recent files stored. Look at the contents of any files that update often, as they might be logs.
  • Use your system configuration utility to view which programs are loaded at computer start-up. You can access this list by typing “msconfig” into the run box.

Security Threat Tutorials From Veracode

Cross-Site Scripting
Cross-Site Request Forgery
LDAP Injection
Mobile Code Security

Keylogger

While the continuous development of technology has certainly made our lives easier, it has also allowed cybercriminals to monitor our online activity in new and advanced ways. Some cyber threats have become so sophisticated that they may be able to bypass even state-of-the-art cybersecurity software. Keyloggers are a perfect example of these “silent” cyber threats – they give hackers easy access to your personal information but can be almost impossible to detect until it’s too late.

Key takeaway: A keylogger is a tool that hackers use to monitor and record the keystrokes you make on your keyboard. Whether they’re installed on your operating system or embedded into the hardware, some keyloggers can be very difficult to detect. Read on to learn more about the most common types of keyloggers.

  • What is it?
  • Keylogger types
  • Keylogger examples
  • How to protect yourself?

Tip: Don’t let your devices become infected with Keyloggers and other malware. Invest in antivirus software and stay safe online.

What is a Keylogger?

A keylogger is a tool or a technology that monitors and logs consecutive keystrokes made on a keyboard. It normally operates in a covert fashion so that potential victims wouldn’t suspect that their activities are being monitored. Hackers can use this tool to record their target’s browsing activity and obtain their personal information, which they can then use for their own financial gain by blackmailing the target, withdrawing funds from their bank account, or selling the info to other cybercriminals on the dark web.

Although they are most often used for malicious purposes, keyloggers can also be used for several relatively legitimate reasons. For one, parents can install a keylogger to track what their children are doing online and receive notifications of any unusual activity. Similarly, business owners and managers can use them to ensure optimal productivity of their staff, as well as to verify that the employees aren’t giving away company secrets. Finally, jealous partners can use keyloggers to track their other half’s online activity.

Often erroneously described as malicious software, keyloggers aren’t always software-based. They can also be hardware-based, in which case they are either built into hardware or available as a separate device. As far as software-based keyloggers are concerned, unless they are legitimate, they are usually bundled with malware, spyware, or a virus. Hackers typically distribute this malicious keylogging software via phishing emails that include compromised attachments and/or links to infected websites.

A survey from 2005 found that more than 15 percent of corporate computers were running some type of keystroke logging software. Seeing as more than 80 percent of business owners in the United States have admitted to monitoring their employees’ activity in some way, it is safe to assume that the number of active keyloggers is much higher nowadays. Any unauthorized use of keylogging software is considered illegal in the United States, and the persons responsible for it could serve up to 20 years for wiretapping.

Keylogger Types

Depending on which part of the computer they are embedded into, all keyloggers can be categorized as either software-based or hardware-based. The five most common types of keyloggers across both these categories include the following:

  1. API-Based Keyloggers

API-based keyloggers are by far the most common. These pieces of keylogging software use the keyboard API (short for application programming interface) to record your keystrokes. Each time you press a key, a notification is sent to the application you are typing in so that the typed character would appear on the screen. API-based keyloggers intercept these notifications and capture each of them as a separate event. The logs are then kept in a file on the system hard drive for easy retrieval by the hacker.

  1. Form Grabbing-Based Keyloggers

Rather than logging each keystroke separately, form grabbing-based keyloggers log the data from your web forms upon submission. Similar to API-based keyloggers, they intercept the submission notification to log all the information you have entered in the form. This can include your full name, address, email phone number, login credentials, or credit card info. The whole process takes place as soon as you hit the “Submit” or “Enter” button and is completed before your form data is submitted to the website.

  1. Kernel-Based Keyloggers

As the name suggests, kernel-based keyloggers inhibit the core of your computer’s operating system (also known as the kernel), which makes them very difficult to detect and remove. They hide inside your operating system and record your keystrokes as they pass through the kernel. Because they are more difficult to write, these keyloggers are rarer than other software-based varieties. They are distributed via rootkits, malicious software bundles that can bypass your computer’s kernel and target the hardware.

  1. Hardware Keyloggers

Hardware keyloggers are devices that use the circuitry inside a keyboard to log keystrokes. They are most often built into the keyboard, although they are also available as either a USB connector (for personal computers) or a Mini-PCI card (for laptop computers). Rather than relying on software to store the logged keystrokes, all records are kept in the internal memory of the device. However, this also means that hackers must have physical access to the keyboard in order to retrieve this information.

  1. Acoustic Keyloggers

Acoustic keyloggers are very complex and are therefore rarely used. They utilize the principles of acoustic cryptanalysis to record your keystrokes on the hardware level. No matter what keyboard you’re using, each key on it has a unique acoustic signature. The differences are subtle, but individual signatures can be determined by analyzing a sample through a variety of statistical methods. However, not only is this very time-consuming but the results might not be as accurate as with other types of keyloggers.

Keylogger Examples

Hackers around the world have been using keyloggers for at least two decades to carry out major cyber attacks against individuals, businesses, and networks. Some of the most notable examples of keylogger attacks include the following:

  • In 2016, a major survey conducted by a US-based cybersecurity firm revealed that businesses from 18 countries were targeted as part of a coordinated campaign that used the Olympic Vision keylogger to obtain confidential business-related information. Distributed via fake emails allegedly sent by business associates, this software-based keylogger logged not only keystrokes but also clipboard images and texts, saved logins, and instant messaging chat histories.
  • In 2007, a group of Romanian hackers launched a global phishing campaign that involved the sending of malicious emails to millions of email addresses. When potential victims clicked on the link included in these emails, a software-based keylogger would be installed on their computers. The perpetrators of this cyber attack were finally identified in October 2018, when it was also revealed that they had stolen more than $4 million since the launch of the attack.
  • In 2015, a UK student was arrested and sentenced to four months in prison after it was revealed that he had used a keystroke logging software to up his exam marks. He installed the software on the computers at his university and used it to steal the staff’s login info. After that, he used the login info to access his university records and up the marks on five of his exams.

    How to Remove a Keylogger

    Some types of keyloggers are easily detected and removed by the best antivirus software (like Norton, BitDefender, Intego or Panda), but some others may prove very difficult to identify and isolate from your system. That’s because many software-based keyloggers are designed like legitimate software and are thus able to bypass most antivirus or anti-malware programs. To make matters worse, some keyloggers run at a higher level of privilege than standard cybersecurity software, which makes them next-to-impossible to detect and remove.

    If you suspect that someone may have installed a keylogger on your computer but your anti-malware software isn’t detecting anything, you may be able to find it in Windows Task Manager. Simply launch Task Manager and take a close look at the list of active processes to see if there’s anything out of the ordinary. If necessary, ask someone tech-savvy to help you with this step. You can also check your system’s firewall for any suspicious activity, such as unusual amounts of incoming and/or outgoing data.

    As with all other cyber threats, the best way to stay safe from keylogger attacks is to use the best antivirus software and run regular scans of your computer. To ensure that you’re protected against the latest threats, you should configure your antivirus program to automatically download virus definition updates. Finally, don’t open any links or attachments included in suspicious emails as they might initiate an “invisible” download of a keylogger, spyware, adware, or some other type of malicious software.

    Sources

    • ABC News
    • Comodo
    • CS Online
    • Darkreading
    • Infosec Institute
    • McAfee
    • Securelist
    • Sophos
    • Techopedia
    • Trendmicro
    • Wikipedia

    A key logger can be hardware-based of software-based.

    Founder of SoftwareLab

    Welcome. We started SoftwareLab in 2014 to help you find the best software at the best price.

    Over the years, we have enjoyed testing the best antivirus for Windows, Mac, Android, and iOS, as well as the best VPN and hosting services.

    We are proud and humbled to have helped millions of readers since then, and we hope you will find our work helpful. If we can improve our service to you, please let us know here.

    Is a keylogger hardware or software?

    What Is a Keylogger? Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked.

    Can keystroke loggers be software based?

    Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

    Can a keylogger be hardware?

    A hardware keylogger is a physical device, such as a USB stick, a PS2 cable, or a wall charger, which records keystrokes and other data. These have typically been wired, but wireless sniffing types have appeared as well. Keylogger software can be installed via phishing emails.

    What are hardware and software loggers?

    So to retrieve the data hackers/attacker have to physically access that. In short, we can say that the Hardware Keylogger is much tough to detect than the software keylogger. Software Keylogger:- This is something that is installed on the hard drive. This type of software is also called spy software.