Description
A Keylogger feature in malware acts as a covert surveillance mechanism, recording every keystroke made on the compromised system. This enables attackers to capture a wide range of sensitive information, from login credentials and personal identification numbers to confidential communications and proprietary code. The collected data is typically encrypted and transmitted to a remote server, where it is decoded and analyzed. Beyond just stealing information, the Keylogger can also provide insights into user behavior and system interactions, allowing attackers to fine-tune their strategies for further exploitation or lateral movement within a network. In essence, the Keylogger serves as both a data harvesting tool and a reconnaissance instrument, making it one of the most insidious features in modern malware.
| Categories | Spy / Surveillance, Credentials |
| Dangerousness | High |
Back Orifice 1.20
NetBus 1.70
SubSeven 1.0
SubSeven 1.1
SubSeven 1.2
SubSeven 1.3
SubSeven 1.4
SubSeven 1.5
SubSeven 1.6
SubSeven 1.7
SubSeven 1.8
SubSeven 1.9
Back Orifice 2000 (BO2K) 1.0
SubSeven 1.9 Apocalypse
SubSeven 2.0
SchoolBus 2.0
SubSeven 2.1
Hack a Tack 2000
SubSeven 2.1.1 GOLD edition
SubSeven 2.1.2 M.U.I.E
Y3K rat 1.0
SubSeven 2.1.3 BONUS
SubSeven 2.1.4 DEFCON 8
Y3K rat 1.5
SubSeven 2.2
Y3K rat 1.6 MS
Optix Pro 1.0
Net-Devil 1.5
Ghost 2.4
MoSucker 3.0b
Beast 1.90
Turkojan 1.0
Beast 1.91
Beast 1.92
SubSeven 2.1.5 Legends
CIA 1.0
CIA 1.1
Beast 2.00
Beast 2.01
LanFiltrator 1.1 Fix 1
Optix Pro 1.32
CIA 1.2
Beast 2.05
Beast 2.02
Fearless Key Spy 2.0
ProRat 1.1
Hue 1.0
ProRat 1.2
ProRat 1.3
Nuclear RAT 1.0 Beta 5