HackDig : Dig high-quality web security articles for hacker

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:259 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Security week-in-Review: Ransomware complaints doubled last year

It’s hard to keep up with the hundreds of security-specific headlines published every week. So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore FBI warnings, spoofed enterprise apps, and bad passwords. Check back every Friday to learn about the latest in security news. R
Publish At:2016-05-28 05:05 | Read:574 | Comments:0 | Tags:Security enterprise apps keyloggers mobile security password

How Soviets used IBM Selectric keyloggers to spy on US diplomats

A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world's first keylogger—a 1970s bug that Soviet spies implanted in US diplomats' IBM Selectric typewriters to monitor classified letters and memos.The electromechanical implants were nothing short of an
Publish At:2015-10-13 18:20 | Read:692 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab bugs eavesdrop

GPU-based rootkit and keylogger offer superior stealth and computing power

Developers have published two pieces of malware that take the highly unusual step of completely running on an infected computer's graphics card, rather than its CPU, to enhance their stealthiness and give them increased computational abilities.Both the Jellyfish rootkit and the Demon keylogger are described as proofs-of-concept by their pseudo-anonymous
Publish At:2015-05-08 03:05 | Read:858 | Comments:0 | Tags:Risk Assessment Technology Lab GPUs graphics cards graphics

Comparing the Regin module 50251 and the "Qwerty" keylogger

On January 17 2015, Spiegel.de published an extensive article based on documents obtained from Edward Snowden. At the same time, they provided a copy of a malicious program codenamed "QWERTY" (http://www.spiegel.de/media/media-35668.pdf), supposedly used by several governments in their CNE operations. We've obtained a copy of the malicious files published
Publish At:2015-01-27 17:50 | Read:973 | Comments:0 | Tags:Blog Research APT Keyloggers Targeted Attacks

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable from underground. Cybercriminals ordinary use malicious code to steal money from victims, the number of malware available in the criminal ecosystem is continuously growing, their level of soph
Publish At:2014-11-13 10:55 | Read:1431 | Comments:0 | Tags:Cyber Crime Malware 419 Cybercrime keyloggers Limitless malw

The Darkhotel APT

 The Darkhotel APT – Kaspersky Lab Research Technical Appendix Much like Crouching Yeti, the Darkhotel APT is an unusually murky, long standing and well-resourced threat actor exhibiting a strange combination of characteristics. This APT precisely drives its campaigns by spear-phishing targets with highly advanced Flash zero-day exploits th
Publish At:2014-11-10 14:00 | Read:1061 | Comments:0 | Tags:Blog Featured Research 0days APT botnets Cyber espionage Key

Woman charged with planting spyware on cop's phone

A California woman has been charged with wiretapping a police officer - her ex-husband - and possessing "illegal interception devices," the Northern California District Attorney’s (DA's) office announced on Friday. The DA said that 40-year-old Kristin Nyunt allegedly eavesdropped on correspondence, including "sensitive law enforcement communications", she go
Publish At:2014-10-22 18:10 | Read:989 | Comments:0 | Tags:Featured Law & order Privacy identity theft John Nyunt keylo

Woman charged with planting spyware on cop's phone

A California woman has been charged with wiretapping a police officer - her ex-husband - and possessing "illegal interception devices," the Northern California District Attorney’s (DA's) office announced on Friday. The DA said that 40-year-old Kristin Nyunt allegedly eavesdropped on correspondence, including "sensitive law enforcement communications", she go
Publish At:2014-10-22 16:35 | Read:1259 | Comments:0 | Tags:Featured Law & order Privacy identity theft John Nyunt keylo

The Ventir Trojan: assemble your MacOS spy

We got an interesting file (MD5 9283c61f8cce4258c8111aaf098d21ee) for analysis a short while ago. It turned out to be a sample of modular malware for MacOS X. Even after preliminary analysis it was clear that the file was not designed for any good purpose: an ordinary 64-bit mach-o executable contained several more mach-o files in its data section; it s
Publish At:2014-10-17 10:20 | Read:1306 | Comments:0 | Tags:Blog Research Apple MacOS Backdoor Keyloggers Malware Descri

Well, that escalated quickly

An interesting title felt just about right for an interesting topic when I first submitted my research paper about the evolution of bitcoin cybercrime for this year's edition of the Virus Bulletin conference, held in the sleepless Seattle. Discussing the situation from an economic standpoint I aimed to paint a picture reflecting how the present geopolitical
Publish At:2014-09-25 18:50 | Read:1207 | Comments:0 | Tags:Blog Featured Research Bitcoin Cybercrime Financial malware

Thefts in Remote Banking Systems: Incident Investigations

More and more companies are asking Kaspersky Lab to carry out detailed investigations of malware-related IT security incidents affecting their business. In this article, we will describe a typical cybercriminal attack aiming at stealing corporate financial assets from a remote banking system. Description of the Incident An organization recently asked K
Publish At:2014-09-12 00:10 | Read:2735 | Comments:0 | Tags:Analysis Featured Publications Backdoor Electronic Payments

Detecting Keyloggers on Dynamic Analysis Systems

Authored by: Kevin Hamacher, Dario Filho, Clemens Kolbitsch One notorious functionality present in many variants of today’s advanced malware is the ability to steal sensitive user information. Taking control of a targeted machine, an adversary has basically unlimited abilities to secretly monitor the actions performed by an unsuspecting victim who
Publish At:2014-08-09 12:42 | Read:1291 | Comments:0 | Tags:Dynamic Malware Analysis Keyloggers

Analyzing an “Ultra-Advanced APT Tool” Using High-Resolution Dynamic Analysis

Every AV I've tested is helpless against Violent Python attacks; the only good defense I've found is @LastlineLabs — Sam Bowne (@sambowne) May 27, 2014 Earlier this week, Sam Bowne (@sambowne) posted a nice example of how to write a simple keylogger in a few lines of Python. He used this code to evaluate a few sandboxes, including Lastline. The full
Publish At:2014-08-09 12:42 | Read:1494 | Comments:0 | Tags:Keyloggers

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud