{"id":36138,"date":"2007-03-29T13:03:00","date_gmt":"2007-03-29T13:03:00","guid":{"rendered":"http:\/\/importtest.dev\/securelist\/2007\/03\/29\/keyloggers-how-they-work-and-how-to-detect-them-part-1\/"},"modified":"2022-03-03T13:17:41","modified_gmt":"2022-03-03T13:17:41","slug":"keyloggers-how-they-work-and-how-to-detect-them-part-1","status":"publish","type":"post","link":"https:\/\/securelist.com\/keyloggers-how-they-work-and-how-to-detect-them-part-1\/36138\/","title":{"rendered":"Keyloggers: How they work and how to detect them (Part 1)"},"content":{"rendered":"

Keyloggers: Implementing keyloggers in Windows. Part Two<\/a><\/p>\n

In February 2005, Joe Lopez, a businessman from Florida, filed a suit<\/a> against Bank of America after unknown hackers stole $90,000 from his Bank of America account. The money had been transferred to Latvia.<\/p>\n

An investigation showed that Mr. Lopez’s computer was infected with a malicious program, Backdoor.Coreflood, which records every keystroke and sends this information to malicious users via the Internet. This is how the hackers got hold of Joe Lopez’s user name and password, since Mr. Lopez often used the Internet to manage his Bank of America account.<\/p>\n\n

However the court did not rule in favor of the plaintiff, saying that Mr. Lopez had neglected to take basic precautions when managing his bank account on the Internet: a signature for the malicious code that was found on his system had been added to nearly all antivirus product databases back in 2003.<\/p>\n

Joe Lopez’s losses were caused by a combination of overall carelessness and an ordinary keylogging program.<\/p>\n

About Keyloggers<\/h2>\n

The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software \u2013 it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.<\/p>\n\n
\nLegitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.<\/p>\n

Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including:<\/p>\n