Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” emails to counterfeit sites Users “give up” personal financial.

Similar presentations

Presentation on theme: "A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” emails to counterfeit sites Users “give up” personal financial."— Presentation transcript:

1 A Software Keylogger Attack By Daniel Shapiro

2 Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial information Technical Subterfuge Software is planted on your system Used to steal information directly from the computer Pharming Software that misdirects users to fraudulent sites RCMP 2005 (

3 “Next Generation” Keyloggers Today’s keyloggers incorporate “stealth” operations Capture more than keystrokes Screen shots Recording of Web addresses Free Examples: BFK, pykeylogger RCMP 2005 (

4 Phishing Using Keyloggers [2] Definition: “A keylogger is something that records keystrokes made on a computer. It captures every key pressed on the keyboard and stores it down in a file or memory bank that can be viewed by the person performing the monitoring in real-time, or at a later date.” [1] There are two types of keylogger: hardware keylogger and software keylogger [1] [2] Dat Tien Nguyen and Xin Xiao

5 Hardware Keylogger [2] Three types [1]: Inline devices that are attached to the keyboard cable Devices which can be installed inside standard keyboards Actual replacement keyboards that contain the key logger already built-in It only can be discovered by people and removed physically [1] [2] Dat Tien Nguyen and Xin Xiao

6 Software Keylogger [1] [1] Dat Tien Nguyen and Xin Xiao

7 Software Keylogger [2] * Can capture both keys pressed and screen * 2 sub-categories [1]: – Visible in the task manager – Invisible and stealth keyloggers * It is true that secure I/O programs can completely protect your computer from software keyloggers [1] [2] Dat Tien Nguyen and Xin Xiao

8 Protecting yourself from Keyloggers First and foremost: The best security and related policy is always built on layers. The best way to protect a system and network from these intrusions always starts with the same methods one would use to prevent the spread of a virus, but additional measures must be taken for these new risk BEYOND those measures. Keyloggers and Trojans often aren’t detected by Antivirus systems, so make sure you have a good spyware detection and removal tool OR verify your Antivirus program handles these spyware threats as well. Make sure this software is update and run regularly as new threats can burrow in at any time. Dynamic Net, Inc.

9 Protecting yourself from Keyloggers Consider installing a personal firewall on each computer or at least enabling a firewall built into the operating system of the computer. Firewalls can’t save the world by themselves, but a good personal firewall monitoring incoming AND outgoing traffic from an individual computer will be a good way to find out if anyone is attempting to break in. It will also give you an idea as to whether or not anyone or thing is attempting to have your computer send data out. Dynamic Net, Inc.

10 Logoff with running keylogger KEYLOGGER

11 My Ideas 1.Run keylogger 2.Log off of shared computer 3.The actions of the next user to log on are compromised OR 1.Run keylogger on kiosk 2.Sit back and collect infoweb accounts 3.Begin spamming activities with harvested accounts

12 Other new attacks 1.Open a portal online 2.Harvest user passwords (e.g. Password = XXX) 3.Inject Trojan+keylogger into website content/service (e.g. streaming video plugin.exe) 4. user saying “I know your password! Your password is XXX! Change your passwords!” 5.User logs into banking website and gives away password to keylogger 6.Empty the bank account and/or sell credit card number

13 Other new attacks A low-tech approach to phishing has caught a NSW-based organisation after its employees were mailed CD-ROMs containing hidden keylogging software. [1] More than 40,000 Web sites have been hit by a mass-compromise attack dubbed Nine Ball that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code... [2] [1] Phishing-attack-Your-keyloggers-are-in-th /0, , ,00.htm [2]

Download ppt "A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” emails to counterfeit sites Users “give up” personal financial."

Similar presentations

Ads by Google