KEYLOGGERS IN CYBERSPACE
Recording Key stroke i.e. KeyStroke Logging / Keyboard Capturing
Keylogger (AKA "key stoke logger") are malware that are either software based and hardware based, secretly installed within your system, and their primarily goal is to steal the information of your activity that you perform on the keyboard as well as all the inputs that you provide to your system.
Keylogger attacks are the decades of the major cyber-attacks against the individual, business , IT company, organization and networks.Some of them many notable example are as follows:-
In the 1970s, the soviet union developed by the and deployed the hardware
keylogger targeting typewriters. Termed the “selective bug”. It measure the
movements of the printing head of IBM selectric type writers on the regional of
magnetic field of rotation and the printing ahead. And that time the keylogger was
written by the Perry kivolowitz and posted by the usenet groups net.unix-wizards
on November 17, 1983. The user-mode program operated by located and dumping
clients as they were assembled in unix kernel. These installed keystroke logger in
the US embassy and consulate building in Moscow. They installed the bugs in
selectric electric typewrites. For classified information they are immune to bugs.
As of 2013 special services still use typewriters.
In 2007, a group of some Romanian hackers launched a phishing campaign that
involved the sending of malicious emails to millions of emails address. When the
attacker that victim will be clicked on that link included in these emails, a
software based keylogger would be installed on their computers. The attackers of
this cyber attack were identical in October 2018, when it was also revealed that
stolen of more than $4 million since the launch of attack.
In 2015, a UK student was arrested to four months in prison after he had accept
that the crime that use of keystroke logging software to up his exam marks. He
installed the software on the system at his university and used to steals the staffslogin information. After that, he used these all login information to access the university records and the marks on five of his exams.
In 2017, the it was conclude that the software based keylogger has capture the
images, texts, clipboard, saved logins and messages include chat history also
confidential business releated information of company that US –based cyber
security with the other 18 countries were target and became the part of keystroke
logger attacks.