Keyloggers are spy software that can be installed locally or remotely, programs that monitor each and every keystroke a user types on a specific computer keyboard and can be installed in just a few seconds by sending an email with a module attached (‘executable file’ .exe file) to the target user.
When the remote or local user clicks the .exe file, the program starts running in silent mode in the background, undetected. Unlike other programs, Keyloggers usually don’t show up in the start menu, windows start-up, program files, add/remove programs or the task manager. Therefore, Keyloggers are extremely difficult to detect.
The passwords and other info are then captured and uploaded to a remote server continuously (usually to the software’s server) the hacker can then access the info by logging into his account at the software’s website. The majority of Keyloggers capture full-size screen-shots of the activities on the target PC and they can usually bypass any Firewall.
If the remote user happens to open the email with a mobile browser, the program won’t/can’t run, the attachment file (.exe file) needs to open on a PC for the program to run.
A good antispyware/anti-keylogger is necessary to remove a Keylogger from your PC.
Due to the availability of Keylogger on Google and other search engines, they have become extremely popular and are extensively used amongst hackers stealing peoples banking passwords, jealous girlfriends monitoring there boyfriends computers and mischievous school kids.
You don’t need hacking skills to hack with a Keylogger, the program does all the work, you simply email the module (.exe file) to the targeted victim and hope they click on the attachment.
Just recently two Eskom employees were caught by the SA Hawks trying to steal R3bn from the Eskom power utility payroll. The hacking tool was a Keylogger. But unfortunately for them, Eskom’s host intrusion protection protocol prevented access from the Keylogger, called Ardamax.
So yes, Keyloggers are still widely used for Cyber hacking, targeting the vulnerable companies that have very little or crap security.