Professional Documents
Culture Documents
IT-321
MALWARE ANALYSIS ASSIGNMENT
2. USES OF KEYLOGGER
8. CONCLUSION
ANDROID KEYLOGGERS
INTRODUCTION
Keyloggers are malware designed to record your keystrokes, or when it comes to
mobile devices, the information you type on your device.
The keylogger softaware can also be found on surface web not only the dark web
readily available to the general public and indexed in the search engines is somewhat
shocking and disturbing.
Sadly, these apps are usually masquerading as parental control solutions, while other
developers are openly encouraging the surveillance of your friends and partners.
Android devices, along with laptops, and other electronic devices has both premium
hardware and software features.
These allow Android devices to function almost the same as our laptops or personal
computers. Given that, our Android devices have also become vulnerable to Android
keyloggers and viruses.
There are diverse kinds of keyloggers depending on the type of key login methods.
Keylogging involves tracking and recording every keystroke made on a keyboard
without the consent and knowledge of the user. It may be in the form of hard
hardware device or software piece of software. The most important aspect of
keylogger is that the login are prone to be used by fraudulent groups to access
sensitive information like username, password credit card numbers and the like.
USES OF KEYLOGGER
1. It can also be important security perspective to monitor their employees’
behavior . They may get notifications on the activities through keyloggers. Thus,
keyloggers can be used to keep employees’ behavior at the desired level.
2. Wives/husbands can also use keylogger technology to track the activities of their
spouses if they feel their spouses are indulging in extra-marital relationships,
Even in case of programs like WhatsApp, Snapchat when search on the browser,
cell phone calls can be tracked using keylogger technology.
3. Employers use the keylogger technology to track the activities of employees.
4. Parents use android keylogger for tracking their children’s activities without
their knowledge.
Keyloggers can be installed when a user clicks on a link or opens an attachment/file from
a phishing mail
A keylogger can exploit an infected system and is sometimes capable to download and
install other malware to the system.
A hacker employs a Trojan virus as a delivery tool to install a keylogger. But way
before one is downloaded onto your system, a hacker will use two different methods
to get it into your computer. And both ways involve your participation.
The first method involves phishing. Phishing is the act of faking an email from a
legitimate company to fish for passwords and credit card numbers. Sometimes,
these emails contain attachments which download programs stealthily into your
computer once you click on them.
For the second method, the hacker researches on his intended victim beforehand in
order to find a weakness in her or his online habits. Let's say a hacker finds out the
victim habitually visits porn sites, the hacker might craft an email with a fake coupon
for a membership into an exclusive erotic website. Since this method targets a
particular fondness of the victim, there's a large chance of success that the he or she
will download the fake attachment, unknowingly installing the keylogger.
When an Android phone battery drains quickly, it’s usually because an app or
software is running in the background. In the case of Android keyloggers, they are
designed to be undetectable and don’t appear as a typical phone app/software
would. So at first, you may not realize a keylogger is spying on you.
Performance Is Slow
As said before, when an app or software is working in the background, it can affect
the phone’s functionality. With this, the phone will operate more slowly. You may be
able to tell this when browsing online or trying to load social media apps.
Take caution when opening attachments: Keyloggers can be present in files received
through email, chats, P2P networks, text messages or even social networks. If
someone sends you an email out of the cold or the contents of the email are asking
for your personal information, chances are there's a keylogger in there somewhere.
CONCLUSION