Sandboxie vs. Pre-Existing Keylogger

Status
Not open for further replies.

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
If a keylogger is already present on one's OS, can Sandboxie, installed after-the-fact, quarantine the browser to where that when you close the sandboxed browser that Sandboxie quarantines and deletes what is logged before the keystrokes are sent to the host malware program??
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Will Sandboxie protect me from malicious key-loggers?

Yes, to some extent. First of all, your system (outside the sandbox) must not have been already compromised by an installed key-logger. Sandboxie can not protect against key-loggers that are already running outside the sandbox.

You may want to consider always browsing sandboxed, so you don't accidentally get any key-loggers into your system.

It is very difficult to reliably detect a key-logger. For a lengthy explanation, see Detecting Key Loggers . So the most important tool Sandboxie offers you for protection against key-loggers, is to delete the sandbox.

When you stop all sandboxed activity (in all sandboxes), then proceed to delete the sandbox you're about to use, you can be fairly certain that all key-loggers are dead.


From FAQ

Detecting Keyloggers
 

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
I guess that a keystroke encryption program such as KeyScrambler would do the trick, unless it was an external keylogger that had already been installed between the keyboard and tower jack.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top