HackDig : Dig high-quality web security articles for hacker

Keyloggers: Be careful what you type

2017-06-09 21:20
keylogger-attacks-companies-panda-security

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking transactions. Hiding your PIN when you use an ATM is a simple way to avoid nasty financial surprises in your bank account, but is not infallible. Cyber-crooks sometimes turn to invisible spies to steal your sensitive information: keyloggers.

What’s a keylogger?

As its name indicates (“key”-“logger”), this term refers to a malicious computer program that secretly records every keystroke made by a computer user. Keyloggers are used to gain fraudulent access to confidential information such as personal details, credit card data, access credentials, etc.

There are two types of keyloggers, based on the method used to log keystrokes: software keyloggers and hardware keyloggers. Hardware-based keyloggers are rare, as they require having physical access to the victim’s device in order to manipulate the keyboard. However, software-based keyloggers are much more common, and may affect any device that is not properly protected. Usually, keyloggers are installed on target computers by other malware specimens, such as Trojans or viruses. For example, an attacker may trick the victim into clicking a malicious link, which then downloads the keylogger into the system.

The enormous danger of these cyber-spies

Unlike other malware specimens, which delete data or hijack files and demand a ransom for their release, keyloggers are designed to go unnoticed while recording the user’s information. That’s why they are so difficult to detect. Keyloggers are usually employed in conjunction with other malicious programs, capturing keystrokes and sensitive information (bank account numbers, passwords, PINs, etc.) which cyber-crooks then leverage to steal corporate confidential data, impersonate users or carry out fraudulent financial transactions.

The infamous “PunkeyPOS” malware is a clear example of the devastating effects that keyloggers can have. This malware infected the point-of-sale (POS) terminals of hundreds of restaurants (mainly in the U.S.), extracting sensitive information belonging to thousands of individuals.

Another infamous example is that of “Eye Pyramid”, the cyber-espionage campaign that threatened the security of many of Italy’s public institutions earlier this year. “Eye Pyramid” was a cyber-espionage ring spearheaded by a brother and sister that installed a keylogger on victims’ computers to steal passwords and access confidential information. Among those affected were former Prime Ministers Matteo Renzi and Mario Monti, as well as the president of the Central European Bank, Mario Draghi, as well as other individuals in possession of sensitive data.

It’s now evident that the professionalization of keylogger-based attacks requires that companies and institutions implement systems that ensure data security. Adaptive Defense 360 is an intelligent cyber-security platform designed by Panda Security to eradicate advanced threats. Its dynamic approach, based on the principles of contextual intelligence, allows organizations to anticipate malicious behavior and prevent data theft. Thus, Adaptive Defense 360 is capable of detecting, blocking and remediating any attack before it even reaches its target.

The post Keyloggers: Be careful what you type appeared first on Panda Security Mediacenter.


Source: /epyt-uoy-tahw-luferac-eb-sreggolyek/ytiruces/retnecaidem/moc.ytirucesadnap.www

Read:778 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

“Keyloggers: Be careful what you type”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud