Mass Logger: Keylogger is extremely dangerous with the ability to change the world of malicious code
Security researchers at Cofense Intelligence have discovered and are closely monitoring a new keylogger called "Mass Logger". According to the researchers, Mass Logger can have an impact on changing the world of malware.
A keylogger is usually a small piece of software - or sometimes more dangerous, even a hardware device - with the ability to record every keystroke the user has pressed on the keyboard. Summing up the results of these keystrokes, the keylogger installer can obtain personal messages, email content, credit card numbers and of course the most dangerous of all types of user passwords.
According to calculations, keylogger is most used in phishing campaigns, malicious attacks. Currently, keyloggers are continuing to develop in terms of both the popularity and sophistication of the source code.

Cofense Intelligence is especially interested in Mass Logger because it is updated very quickly. The person behind Mass Logger is constantly updating and improving so that it easily bypasses security systems. With this ultra-fast development capability, Mass Logger authors can also quickly edit and add new features as required and customer feedback.
NYANxCAT is the author of Mass Logger. In addition, this object is also the owner of some other notorious malicious codes such as LimeRAT, AsyncRAT . Malicious, NYANxCAT hacking software is often rich in features and easy to use. However, Mass Logger may be the most advanced feature of NYANxCAT. For example, Mass Logger has the ability to spread, install onto victim's computer via USB.
NYANxCAT is constantly improving the functions of the Mass Logger through updates. In just the last 3 weeks, 13 updates have been released by NYANxCAT. In the updated notes collected by Cofense, NYANxCAT revealed that new targets have been added to Mass Logger's identity theft function. In addition, a number of security measures have been added to prevent this keylogger from being detected by the antivirus system.

The variety of features and sophisticated evasion capabilities help Mass Logger stand out from other malicious code. For example, Mass Logger allows hackers to search for files in a specific format and copy them. Cofense found evidence that cybercriminals are abandoning other popular keyloggers like Agent Tesla to Mass Logger.
To combat Mass Logger and similar threats, Cofense recommends that system administrators be aware of suspicious FTP file transfer protocols or emails. Besides, users should not let strangers come into contact with their computer, do not click unreliable links.
You should read it
- Warning: New malicious code is infecting about 500,000 router devices
- 14 games on the App Store contain malicious code, iPhone users be careful
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- Malicious code is growing up
- Find bug in Emotet malware, prevent it from spreading for 6 months
- 10 million Android devices are preinstalled with malicious code from the factory
- Detects malicious code showing porn ads in children's games on Google Play
- 'Battle' between KeyScrambler and KeyLogger
May be interested
- How to Find and Remove Keyloggersa keylogger (or keylogger) is malicious software or hardware installed on a computer that has the ability to monitor user input. although keyloggers are legal in some there are rare cases, but hackers still often use keyloggers to collect information and passwords. this keylogger can cause your computer to operate sluggishly. today's tipsmake will show you how to find and remove keyloggers.
- Warning: Detected malicious code hidden in the graphics card's VRAMone of the aspects that make cybercriminals dangerous lies in the initiative they take in deploying new forms of malicious attacks.
- Download Free Keylogger 5.4: the software to record all keystrokes of users on the computerfree keylogger is one of the programs that has the ability to record each user's keystrokes on the computer while still hidden in the background. a simple but useful utility.
- Appearing dangerous Android malicious code specializing in stealing chat content on Facebook Messenger, Skype ...a type of malware that has a package name is com.android.boxa that can steal users' private chat data on current messaging applications such as facebook messenger, skype, etc., by experts from the company. network security trustlook detected on android operating system.
- New malware using web application has turned into a source of attack, very difficult to detectrecently, researchers from talos (microsoft) and cisco have discovered a new type of malicious code that is very complex and has an extremely fast spreading speed.
- Warning: Dangerous new malicious code spills over to Vietnamon the afternoon of february 14, bkav's virus surveillance system issued a warning about a w32.weakpass extortion encryption code-targeting campaign targeting vietnamese public servers of foreign hackers.
- Is it the most dangerous .vn domain in the world?mcafee has just published the survey results that startled the security community in vietnam, saying that .vn websites are the most dangerous addresses in the world. is the domain name of .vn website really dangerous?
- How to detect malicious apps on Androidinstalling applications outside of google play is often potentially risky, making users more likely to steal personal data and money. therefore, the detection of malicious applications on android phones will help you distinguish what will be a safe application, where the application contains malicious code, thereby minimizing the download of dangerous applications. security and protection of android devices become safer.
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replacedan extremely dangerous malware called lojax has just been discovered by eset security firm. this malware is infecting a victim computer with malicious code.
- Keyloggers ... 'evil religion'in the final period of this keylogger topic, we present the features of some keyloggers of the 'evil cult' type, the keyloggers of the most dangerous form today. keylogger 'deviant' is considered the supreme development of