keylogger


Introduction Dyzap belongs to a family of malware designed to steal confidential information from enormous target applications by installing a “man in the browser” attack into common browsers. FortiGuard Researchers recently discovered a new variant of this Trojan virus. Stolen information may include, but is not limited to, system information and application credentials stored on infected systems. In this blog, we will explain how the malware steals user accounts, acts as a keylogger, and communicates with its C&C server. Stealing... [Read More]
by RSS Bahare Sabouri and He Xu  |  Feb 22, 2017  |  Filed in: Security Research
  Introduction The ART team at Fortinet has discovered a new malware named Proteus, a multifunctional botnet written in .NET that appears to be a proxy, coin miner, e-commerce merchant account checker, and keylogger. This particular botnet is downloaded by the Andromeda botnet. The handful of malicious features densely packed in this new malware also includes the ability to drop other malware. We have compiled its main features in this brief analysis. Data Encryption All C&C communication is encrypted with a symmetrical algorithm.... [Read More]
by RSS Donna Wang, Jacob (Kuan Long) Leong  |  Nov 28, 2016  |  Filed in: Security Research
In nature, predators on the hunt for food often wait by small ponds and marshes for their prey. The reason? Animals of all kinds will inevitably flock to a watering hole out of necessity in order to survive - including vulnerable prey. When that occurs, the predator only has to pounce in order to fulfill its objectives. Wikimedia Commons In short, the watering hole removes the challenge of finding and chasing an elusive target. The same concept applies to watering hole attacks. As the name suggests, watering hole attacks occur when an attacker... [Read More]
by RSS Stefanie Hoffman  |  Oct 23, 2013  |  Filed in:
Once upon a time in 2009 the City of Bozeman, Montana found itself at the brunt of a public firestorm when it became known that members had the audacity to request social networking credentials from applicants. Oh, those were the good ole' days. The issue once again came to the forefront of public attention in recent weeks when news reports started indicating that not only are other employers following suit, but demanding users' social networking credentials was staring to become an accepted hiring practice. In one story, the AP illuminated... [Read More]
by RSS Stefanie Hoffman  |  Apr 02, 2012  |  Filed in: Industry Trends