Advice Request What is your keylogger defense in 2020?

Please provide comments and solutions that are helpful to the author of this topic.

L

Local Host

So firewall is not optimum solution although it may prevent the data breach but will not detect the infection occured
Has keyloggers has some symptoms which may trigger certain AV module ?? And if which part 🤔🤔 ??
You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.
 
F

ForgottenSeer 85911

You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.

none of what you posted here is correct
there are ample cases where keylogging is done in ways that AV does not detect, powershell or wmic is a good place to start
no administrative permissions needed on Windows
no exploit required
 

ichito

Level 11
Verified
Top Poster
Content Creator
Well-known
Dec 12, 2013
541
Hmm...it 's repeted in some other places...int this forum also...that detection of some logger actions...not only key-logger...means that our defence is bypassed and next...in consequences...our plan/idea of builded security is invalid. I assume that such opinion is based on detection offered by AV/IS apps and its all featured that working on every possible black/block lists and signatures of AV engines...and that's why can't agree with it. AV is not the beginning and the end of security that we can have and there are a lot of others technolgies that can give us much more...that are a bit further from common apps but still can protect without bad effects.
 

ichito

Level 11
Verified
Top Poster
Content Creator
Well-known
Dec 12, 2013
541
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
 

DDE_Server

Level 22
Thread author
Verified
Top Poster
Well-known
Sep 5, 2017
1,168
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
Thanks a lot for the links @ichito i will take a look on them to gain more understanding
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top