Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I nearly fell for one of these

I nearly fell for one of these

Scheduled Pinned Locked Moved The Lounge
csharpsecurityannouncement
19 Posts 11 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    ..there does not have to be a specific forum for your question, if there's no category that fits than pick the closest thing to it. Then again, you are simply opening an unsafe document with macro's; you know how that works :) If you want to know whether you can detect a keylogger, the answer is no.

    Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

    T Offline
    T Offline
    TheGreatAndPowerfulOz
    wrote on last edited by
    #3

    Eddy Vluggen wrote:

    detect a keylogger

    Um, depending on how it's written, a software one can most likely be detected. A hardware one, most likely not.

    #SupportHeForShe Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun

    L 1 Reply Last reply
    0
    • L Lost User

      Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

      Get me coffee and no one gets hurt!

      R Offline
      R Offline
      raddevus
      wrote on last edited by
      #4

      Very nice of you to report your moment of fog on this, because if it could get an advanced tech user such as yourself (being a developer) it can definitely get other non-tech users. Sorry you went through that. EDIT BTW - I use VirusTotal - Free Online Virus, Malware and URL Scanner[^] for these types of things. Would love to see the results for your scan of that download.

      L 2 Replies Last reply
      0
      • L Lost User

        Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

        Get me coffee and no one gets hurt!

        Kornfeld Eliyahu PeterK Offline
        Kornfeld Eliyahu PeterK Offline
        Kornfeld Eliyahu Peter
        wrote on last edited by
        #5

        I became so suspicious, that last week I deleted a bunch of emails from CEO, because it came via the new attendance system... Not that it matters after all - I do not use that system, so it was sent to me by mistake anyway...

        Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

        "It never ceases to amaze me that a spacecraft launched in 1977 can be fixed remotely from Earth." ― Brian Cox

        1 Reply Last reply
        0
        • R raddevus

          Very nice of you to report your moment of fog on this, because if it could get an advanced tech user such as yourself (being a developer) it can definitely get other non-tech users. Sorry you went through that. EDIT BTW - I use VirusTotal - Free Online Virus, Malware and URL Scanner[^] for these types of things. Would love to see the results for your scan of that download.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #6

          Quote:

          Sorry you went through that.

          Thanks, but there was no harm done in the end, and it did serve to make me more careful. :)

          Get me coffee and no one gets hurt!

          1 Reply Last reply
          0
          • T TheGreatAndPowerfulOz

            Eddy Vluggen wrote:

            detect a keylogger

            Um, depending on how it's written, a software one can most likely be detected. A hardware one, most likely not.

            #SupportHeForShe Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #7

            TheGreatAndPowerfulOz< wrote:

            Um, depending on how it's written, a software one can most likely be detected.

            Yes, would be nice if you knew what you were looking for then :rolleyes: --edit There was an article about hooks on The Old New Thing, but I cannot find it at the moment.

            Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

            1 Reply Last reply
            0
            • L Lost User

              Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

              Get me coffee and no one gets hurt!

              D Offline
              D Offline
              Daniel Pfeffer
              wrote on last edited by
              #8

              Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

              If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

              L S 2 Replies Last reply
              0
              • D Daniel Pfeffer

                Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

                If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #9

                Quote:

                at least you had the backup. Most non-professionals don't even have one.

                As Sean would say: "Inconceivable!" :-D

                Get me coffee and no one gets hurt!

                1 Reply Last reply
                0
                • L Lost User

                  Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

                  Get me coffee and no one gets hurt!

                  Richard DeemingR Offline
                  Richard DeemingR Offline
                  Richard Deeming
                  wrote on last edited by
                  #10
                  1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
                  2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
                  3. Profit! :D

                  "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                  "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                  L M 2 Replies Last reply
                  0
                  • L Lost User

                    Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

                    Get me coffee and no one gets hurt!

                    I Offline
                    I Offline
                    Ian Shlasko
                    wrote on last edited by
                    #11

                    Cornelius Henning wrote:

                    I recently got an email with a Word attachment

                    Red flag #1

                    Cornelius Henning wrote:

                    that insisted I install Silverlight

                    And that's when you toss it in the spam folder.

                    Proud to have finally moved to the A-Ark. Which one are you in?
                    Author of the Guardians Saga (Sci-Fi/Fantasy novels)

                    1 Reply Last reply
                    0
                    • Richard DeemingR Richard Deeming
                      1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
                      2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
                      3. Profit! :D

                      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #12

                      Valuable advice! Thanks. :)

                      Get me coffee and no one gets hurt!

                      1 Reply Last reply
                      0
                      • R raddevus

                        Very nice of you to report your moment of fog on this, because if it could get an advanced tech user such as yourself (being a developer) it can definitely get other non-tech users. Sorry you went through that. EDIT BTW - I use VirusTotal - Free Online Virus, Malware and URL Scanner[^] for these types of things. Would love to see the results for your scan of that download.

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #13

                        I'm familiar with VirusTotal, but did not think of using it before I deleted the offending email with its attachment and all.

                        Get me coffee and no one gets hurt!

                        1 Reply Last reply
                        0
                        • D Daniel Pfeffer

                          Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

                          If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                          S Offline
                          S Offline
                          Single Step Debugger
                          wrote on last edited by
                          #14

                          Daniel Pfeffer wrote:

                          Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

                          :sigh: But in my defense, I use my home PC only for gaming and paying bills, and also I'm notoriously lazy.

                          There is only one Vera Farmiga and Salma Hayek is her prophet! Advertise here – minimum three posts per day are guaranteed.

                          1 Reply Last reply
                          0
                          • L Lost User

                            Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

                            Get me coffee and no one gets hurt!

                            P Offline
                            P Offline
                            Plamen Dragiyski
                            wrote on last edited by
                            #15

                            Well, again linux community is excluded from such an interesting software.

                            Richard DeemingR 1 Reply Last reply
                            0
                            • L Lost User

                              ..there does not have to be a specific forum for your question, if there's no category that fits than pick the closest thing to it. Then again, you are simply opening an unsafe document with macro's; you know how that works :) If you want to know whether you can detect a keylogger, the answer is no.

                              Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

                              F Offline
                              F Offline
                              Fabio Franco
                              wrote on last edited by
                              #16

                              Eddy Vluggen wrote:

                              If you want to know whether you can detect a keylogger, the answer is no.

                              Yes you can. A keylogger needs to register a hook with SetWindowsHookEx win32 API. That said, although tricky, you can detect installed global hooks. And somebody has already done it: [GitHub - prekageo/winhook](https://github.com/prekageo/winhook). It would be a tricky task to monitor and detect legit from malware global hooks. But it is possible.

                              To alcohol! The cause of, and solution to, all of life's problems - Homer Simpson ---- Our heads are round so our thoughts can change direction - Francis Picabia

                              1 Reply Last reply
                              0
                              • P Plamen Dragiyski

                                Well, again linux community is excluded from such an interesting software.

                                Richard DeemingR Offline
                                Richard DeemingR Offline
                                Richard Deeming
                                wrote on last edited by
                                #17

                                :laugh: Linux Ransomware Is Now Attacking Webmasters | TechCrunch[^] Ransomware meets Linux – on the command line! – Naked Security[^] New FairWare Ransomware targeting Linux Computers[^] Linux Ransomware and why everyone could be affected - Feature - PC Advisor[^] Linux and rise of Ransomware - Linux Audit[^]


                                "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                                "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                                1 Reply Last reply
                                0
                                • Richard DeemingR Richard Deeming
                                  1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
                                  2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
                                  3. Profit! :D

                                  "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                                  M Offline
                                  M Offline
                                  Mark Mondor
                                  wrote on last edited by
                                  #18

                                  I read about this yesterday on ZDNet, it's probably not a macro, but an image (install Silverlight) that points to a Visual Basic Script instead of a URL which installs the keylogger. Details: [^]

                                  Richard DeemingR 1 Reply Last reply
                                  0
                                  • M Mark Mondor

                                    I read about this yesterday on ZDNet, it's probably not a macro, but an image (install Silverlight) that points to a Visual Basic Script instead of a URL which installs the keylogger. Details: [^]

                                    Richard DeemingR Offline
                                    Richard DeemingR Offline
                                    Richard Deeming
                                    wrote on last edited by
                                    #19

                                    Which is why you change the .vbs file association to open with Notepad instead of WScript. :) Still doesn't hurt to disable macros, though, since some ransomeware still uses them.


                                    "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                                    "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                                    1 Reply Last reply
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Don't have an account? Register

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups