#Keylogger

2026-01-02

@Andromxda ich würde es nicht ausschließen, dass einige Instanzen im einem virtualisierten Linux auf einem Microsoft/Apple-System oder in einer US-Cloud laufen. Man kann sich drehen wie man will und stets ein „ja aber“ anhängen - es ist jedoch keine digitale Souveränität, wenn US-Datenkraken direkten oder indirekten Zugriff haben. Die Kette ist nur so stark, wie das schwächste Glied. An #snowden s Worte , #Cloudact , #Keylogger & #Prism kann man nicht oft genug erinnern.

Michael Richardsonmcr314@todon.nl
2025-12-01

Talking about geolocation evidence in a datacenter, and having humans carry the Evidence from outside (where you can see satellites)... and I was thinking about people picking up random USB keys outside the smoking door. So vapes are USB rechargeable... I wonder about hidding a keylogger in a USB rechargeable vape. #vape #keylogger

2025-09-10

Der Praxisteil meines „Hacking- und Pentest-Hardware-Workshops” umfasst fünf Stationen. In Kleingruppen von maximal drei Personen arbeiten die Teilnehmenden etwa eine Stunde lang die Aufgaben durch. In dieser Zeit gehe ich von Station zu Station und gebe Tipps sowie zusätzliche Informationen. Bei der ersten Station „Gadgets & Logger” dreht sich alles um Spionagegadgets, Keylogger und Screenlogger.
➡️ Klicken Sie hier, um mehr über die Workshop-Inhalte zu erfahren: scheible.it/workshop
#ITSicherheit #CyberAwareness #Seminar #SecurityKnowHow #Keylogger

2025-08-14

🚨 Watch out as the new #PS1Bot malware steals crypto wallets, passwords, and sensitive data, spreading through #malvertising while evading detection.

Read: hackread.com/malvertising-atta

#CyberSecurity #Malware #Crypto #Keylogger

On a recent engagement a USB #keylogger was found. My colleague Cass and I analyzed the key logger to find leads towards the threat actor. We have written down what we learned on our side quest:

research.hisolutions.com/2025/
#DFIR #Forensics

2025-07-28

📢New in our Research-Blog: A Tale of Practical Keylogger Forensics

On a recent engagement, an interesting hardware side quest popped up.
A client had found a #keylogger and, naturally, Cass Rebellin and @jrt wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.
The full story 👉research.hisolutions.com/2025/

#ResearchBlog #DFIR #HardwareSecurity

Im Hintergrund sieht man ein Grafikteil, an dem mit Werkzeug gebastelt wird. Bildtitel" Research-Blog A Tale of Practical Keylogger Forensics"
Tecnoblog • tecnologia que interessatecnoblog.net@web.brid.gy
2025-06-17

O que é keylogger? Veja como funciona e quais são as formas de proteção

fed.brid.gy/r/https://tecnoblo

<figure class="wp-block-image size-large wp-lightbox-container"><img alt="Teclado do Avell Hyb A70 (imagem: Emerson Alecrim/Tecnoblog)" class="wp-image-625080" height="596" src="https://files.tecnoblog.net/wp-content/uploads/2022/05/avell-hyb-a70-1060x596.jpg" width="1060" /><button class="lightbox-trigger" type="button">
			<svg fill="none" height="12" viewBox="0 0 12 12" width="12" xmlns="http://www.w3.org/2000/svg">
				<path d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" fill="#fff">
			</svg>
		</button><figcaption class="wp-element-caption">Entenda como funciona o malware que monitora as ações do seu teclado (imagem: Emerson Alecrim/Tecnoblog)</figcaption></figure>



<p>Um keylogger é um software ou hardware malicioso que registra todas as teclas digitadas em um dispositivo, incluindo senhas, dados bancários e outras informações. Ele atua como um espião invisível, capturando cada detalhe digitado pela pessoa.</p>



<p>Criminosos usam o recurso para roubar dados sensíveis e, assim, acessar contas online, realizar fraudes financeiras e outras ações que causam prejuízos à vítima. Existem keyloggers baseados em software (instalados no sistema) e em hardware (dispositivos físicos).</p>



<p>Conheça mais sobre o keylogger, como ele funciona e como se proteger desse malware.</p>



<div class="wp-block-yoast-s
Kevin Karhan :verified:kkarhan@infosec.space
2025-05-22

@GossiTheDog @signalapp it merely prevents #Screenshots by claiming it's #DRM'd content.

The correct solution for #Signal would be to alert all their users and specifically block #Windows in general or at least #Windows11 simply because it is a #Govware and empirically cannot be made private or secure.

But that would require them to actually give a shit, which thed don't, cuz otherwise they would've stopped demanding #PII like a #PhoneNumber and moved out of juristiction of #CloudAct.

  • I mean, what's gonna prevent the #Trump-Regime from threatening @Mer__edith et. al. with lifetime in jail for not kicking the #ICC (or anyone else he and his fans dislike) from #Signal's infrastructure?

Since they are highly centralized.they certainly are capable to comply with "#Sanctions" (or whatever bs he'll claim!)...

Kevin Karhan :verified:kkarhan@infosec.space
2025-05-22

@signalapp Personally, I think warning people against using #Windows - espechally #Windows11 - at all would be more effective.

#Espechally since that #DRM #hack is an #ask and doesn't undo the #Keylogger that #MicrosoftRecall includes!

But hey, feel free to shill #TechIlliterates a false sense of #PseudoSecurity instead of making your #App actually secure!

2025-05-05

@heisec

Auf #Android niemals die vorinstallierte Tastatur verwenden, gerade bei #Samsung mit seiner bloatware!

Stattdessen #Heliboard (wenn man Autokorrektur braucht) oder #Florisboard (um stattdessen die Tastatur so anzupassen, dass man auch so schreiben kann)

Software-Tastaturen sind (theoretisch) #Keylogger und brauchen volles Vertrauen!

Christian MayerTheFox21
2025-05-01

One of my first repositories I ever pushed to was a written in C++. After 15 years I rewrote the project in : github.com/TheFox/keylogger

not Evander SinqueFiLiS
2025-04-15

Es gibt nichts zu sehen, bitte gehen Sie weiter.

Popup in MacOS, wo Microsoft Teams nach der Berechtigung fragt, alle Tastatureingaben aller anderen Anwendungen zu empfangen.
Jérôme Herbinet | FLOSSjerome_herbinet@pouet.chapril.org
2025-04-11

💡 Sous #Android, à défaut d'avoir e/OS/, on pense à remplacer nos applis propriétaires par des #LogicielsLibres et #OpenSource ... appels, agenda, SMS, cloud, galerie, vidéos YouTube, GPS / cartographie, magasins d'applications, etc... mais QUID de votre clavier ?

Et oui, il faut aussi remplacer votre clavier car c'est aussi via cette application que les données fuitent !

Dites-vous que le clavier natif de #Google est un véritable #keylogger 🕵️

Mon clavier actuel : f-droid.org/packages/helium314

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-04-05

Today's reminder of the insider threat involves a pharmacist in Maryland who over a period of 8 years or more, used keyloggers and installed spyware on about 400 computers at the University of Maryland Medical System so he could spy on female co-workers in private moments at work (such as changing clothes, breastfeeding their babies), and in their homes. He was reportedly fired in October 2024, and was able to get another job in another healthcare facility in Maryland because there has been no criminal charges filed against him yet and UMMS apparently didn't alert his new employer.

If Maryland law is like my state's laws, the hospital may be barred legally from revealing what happened if asked for a recommendation by the new employer. And it seems the Maryland state pharmacy board can't just suspend a license unless there's been a conviction, so the failure to have criminal charges filed already seems to have put more potential victims at risk.

Unsurprisingly, a potential class action lawsuit has already been filed against UMMS with six plaintiffs so far. There are estimates that there are more than 80 victims of the now-former employee.

Some of the media coverage on the case: thedailyrecord.com/2025/04/04/

#InsiderThreat #keylogger #workplace #privacy #infosec

👾 #MassLogger is a stealer and #keylogger notorious for its variety of infection and evasion techniques.
As low-cost #MaaS, it is accessible by a wide audience of malefactors.

🔗 Learn more & collect #IOCs to strengthen company's security: any.run/malware-trends/masslog

#infosec #Cybersecurity

Social media post I wrote about #RemcosRAT for my employer at linkedin.com/posts/unit42_remc and x.com/malware_traffic/status/1

2025-03-10 (Monday): #Remcos #RAT activity. Email distribution used a zip archive attachment with a .7z file extension. During a test infection, we saw indicators of a #Keylogger and a Hacking tool to view browser passwords.

More info at github.com/PaloAltoNetworks/Un

A #pcap of the infection traffic and the associated #malware files are available at malware-traffic-analysis.net/2

Screenshot of the email distributing Remcos RAT, focusing on the attached archive and its contents.Traffic from the Remcos RAT infection filtered in Wireshark.  It show information about the infected Windows host, and it also shows a Windows EXE sent over the C2 traffic.  The Windows EXE is a hacker tool to view browser passwords.Location of a text file for an offline keylogger. The image shows the beginning of the contents of this keylogger data file.This infection was persistent through copies of the initial malware saved to the AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup directory.  This image also shows a Windows Registry update caused by the Remcos RAT infection.
2025-02-20

‼️ Ein neuer Angriff mit dem Snake-#Keylogger betrifft Millionen von #Windows-Nutzern.

Die #Schadsoftware zeichnet unbemerkt #Tastatureingaben auf, um #Passwörter und sensible Daten zu stehlen.

Laut Fortinet wurden seit Jahresbeginn über 280 Millionen #Infektionsversuche registriert. Besonders verbreitet ist der Angriff in #China, der #Türkei, #Indonesien, #Taiwan und #Spanien. Der Keylogger wird meist über #Phishing-Mails verbreitet.

golem.de/news/zugangsdaten-in-

#Cybersecurity #Malware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst