New Trojan keylogger disables both virtual keyboards

Virtual keyboard which is considered a salvage solution for users before the keylogger threat has now lost its advantage over the new generation of keylog malware.

Keylogger is a malicious software designed to record keystrokes on infected systems to send back to its author. Virtual keyboard is a solution that allows users to use the mouse to enter signs from a virtual keyboard on the screen. The old generation keylogger is completely bundled with this solution but with the newly discovered keylog trojan, it is not.

New Trojan keylogger disables both virtual keyboards Picture 1 Hispasec Systems - a security firm of Ban Nhan - has revealed details and a Trojan capable of taking screenshots on infected systems. If the user has entered the online bank account PIN on the virtual keyboard, the trojan can still be recorded via screenshots.

Like all other trojans, Hispasec's new trojan also hacked into users' systems whenever they accessed a malicious website, Bernardo Quintero - Hispasec's security researcher - said . That means that users will not receive any indication that they have been infected with this software.

Quintero's research team has experimented with 30 different anti-virus software that is considered to be capable of combating keylog malware screenshots. But there are only 6 successful applications.

Gartner Avivah Litan's security analyst said that malware that could capture screenshots began to explode in early 2003. The first victim of the software is a Brazilian bank. However, this attack technique is still relatively rare because this type of program consumes a lot of system capacity and bandwidth - which is very easy to catch consumers' attention.

But everything changed with the new trojan discovered by Hispases. Researcher Quintero confirmed that the trojan incorporates keystrokes and screen shots. But instead of taking a picture of the entire screen, the trojan only takes a screenshot of the area around the user clicked area. That means the screen shots will be lighter and make it harder to detect.

So, at this point, the security industry and users must admit the fact that no single security solution is safe. Need to combine various security solutions.

Hoang Dung

4 ★ | 1 Vote

May be interested

  • New IM worms disguise as e-cards to steal informationPhoto of New IM worms disguise as e-cards to steal information
    users of instant messaging services windows live messenger are currently facing the risk of losing personal information before the arrival of the heartworm worm.
  • There are worms to fake Microsoft patches againPhoto of There are worms to fake Microsoft patches again
    security firm sophos has warned of the emergence of a new stration worm computer variant in the form of fake microsoft security updates. sophos's latest report confirms that the depatio-an worm variant is spreading at a very fast pace.
  • Kaspersky warned about Warezov virus outbreakPhoto of Kaspersky warned about Warezov virus outbreak
    security firm kaspersky lab has warned about the emergence of warezov virus, which is spreading strongly via email. kaspersky lab said the win32.warezov.at worm uses its own smtp engine to send copies to email addresses that it declares.
  • Add a virus spread through Yahoo! IMPhoto of Add a virus spread through Yahoo!  IM
    afternoon 1-8, a virus named vloveym has spread to a series of computers in vietnam. according to the analysis of the network security center (bkav), this virus appeared on july 28. just like the previous gaixinh (xrobot) and ymheart viruses, vloveym is mainly in
  • How to kill Vlove virusPhoto of How to kill Vlove virus
    the vietnamese internet community is witnessing a new 'flood' from the internal virus called vlove, spread through the most popular yahoo messenger instant messaging service today. virus sends im to the entire list frien
  • 'Suicide' virus - New threat on the InternetPhoto of 'Suicide' virus - New threat on the Internet
    the 'suicide' virus - a virus capable of destroying all signs of its own existence after completing the task - is now becoming a new threat on the internet.