Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I nearly fell for one of these

I nearly fell for one of these

Scheduled Pinned Locked Moved The Lounge
csharpsecurityannouncement
19 Posts 11 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T TheGreatAndPowerfulOz

    Eddy Vluggen wrote:

    detect a keylogger

    Um, depending on how it's written, a software one can most likely be detected. A hardware one, most likely not.

    #SupportHeForShe Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun

    L Offline
    L Offline
    Lost User
    wrote on last edited by
    #7

    TheGreatAndPowerfulOz< wrote:

    Um, depending on how it's written, a software one can most likely be detected.

    Yes, would be nice if you knew what you were looking for then :rolleyes: --edit There was an article about hooks on The Old New Thing, but I cannot find it at the moment.

    Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

    1 Reply Last reply
    0
    • L Lost User

      Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

      Get me coffee and no one gets hurt!

      D Offline
      D Offline
      Daniel Pfeffer
      wrote on last edited by
      #8

      Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

      If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

      L S 2 Replies Last reply
      0
      • D Daniel Pfeffer

        Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

        If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #9

        Quote:

        at least you had the backup. Most non-professionals don't even have one.

        As Sean would say: "Inconceivable!" :-D

        Get me coffee and no one gets hurt!

        1 Reply Last reply
        0
        • L Lost User

          Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

          Get me coffee and no one gets hurt!

          Richard DeemingR Offline
          Richard DeemingR Offline
          Richard Deeming
          wrote on last edited by
          #10
          1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
          2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
          3. Profit! :D

          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

          "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

          L M 2 Replies Last reply
          0
          • L Lost User

            Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

            Get me coffee and no one gets hurt!

            I Offline
            I Offline
            Ian Shlasko
            wrote on last edited by
            #11

            Cornelius Henning wrote:

            I recently got an email with a Word attachment

            Red flag #1

            Cornelius Henning wrote:

            that insisted I install Silverlight

            And that's when you toss it in the spam folder.

            Proud to have finally moved to the A-Ark. Which one are you in?
            Author of the Guardians Saga (Sci-Fi/Fantasy novels)

            1 Reply Last reply
            0
            • Richard DeemingR Richard Deeming
              1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
              2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
              3. Profit! :D

              "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #12

              Valuable advice! Thanks. :)

              Get me coffee and no one gets hurt!

              1 Reply Last reply
              0
              • R raddevus

                Very nice of you to report your moment of fog on this, because if it could get an advanced tech user such as yourself (being a developer) it can definitely get other non-tech users. Sorry you went through that. EDIT BTW - I use VirusTotal - Free Online Virus, Malware and URL Scanner[^] for these types of things. Would love to see the results for your scan of that download.

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #13

                I'm familiar with VirusTotal, but did not think of using it before I deleted the offending email with its attachment and all.

                Get me coffee and no one gets hurt!

                1 Reply Last reply
                0
                • D Daniel Pfeffer

                  Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

                  If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                  S Offline
                  S Offline
                  Single Step Debugger
                  wrote on last edited by
                  #14

                  Daniel Pfeffer wrote:

                  Look on the bright side - at least you had the backup. Most non-professionals don't even have one.

                  :sigh: But in my defense, I use my home PC only for gaming and paying bills, and also I'm notoriously lazy.

                  There is only one Vera Farmiga and Salma Hayek is her prophet! Advertise here – minimum three posts per day are guaranteed.

                  1 Reply Last reply
                  0
                  • L Lost User

                    Phishing email scam utilizes keylogger malware to steal sensitive information[^] I recently got an email with a Word attachment that insisted I install Silverlight in order to view the attachment. I did run the install in a moment of stupidity, but immediately realized my mistake. So I re-imaged my systems drive from a recent image to get rid of any potential malware. I also changed all my critical passwords with financial institutions.:mad: I have suggested it before, but I really wish we had a Security Forum on CP, where members can exchange data about such malware to benefit all of us.

                    Get me coffee and no one gets hurt!

                    P Offline
                    P Offline
                    Plamen Dragiyski
                    wrote on last edited by
                    #15

                    Well, again linux community is excluded from such an interesting software.

                    Richard DeemingR 1 Reply Last reply
                    0
                    • L Lost User

                      ..there does not have to be a specific forum for your question, if there's no category that fits than pick the closest thing to it. Then again, you are simply opening an unsafe document with macro's; you know how that works :) If you want to know whether you can detect a keylogger, the answer is no.

                      Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

                      F Offline
                      F Offline
                      Fabio Franco
                      wrote on last edited by
                      #16

                      Eddy Vluggen wrote:

                      If you want to know whether you can detect a keylogger, the answer is no.

                      Yes you can. A keylogger needs to register a hook with SetWindowsHookEx win32 API. That said, although tricky, you can detect installed global hooks. And somebody has already done it: [GitHub - prekageo/winhook](https://github.com/prekageo/winhook). It would be a tricky task to monitor and detect legit from malware global hooks. But it is possible.

                      To alcohol! The cause of, and solution to, all of life's problems - Homer Simpson ---- Our heads are round so our thoughts can change direction - Francis Picabia

                      1 Reply Last reply
                      0
                      • P Plamen Dragiyski

                        Well, again linux community is excluded from such an interesting software.

                        Richard DeemingR Offline
                        Richard DeemingR Offline
                        Richard Deeming
                        wrote on last edited by
                        #17

                        :laugh: Linux Ransomware Is Now Attacking Webmasters | TechCrunch[^] Ransomware meets Linux – on the command line! – Naked Security[^] New FairWare Ransomware targeting Linux Computers[^] Linux Ransomware and why everyone could be affected - Feature - PC Advisor[^] Linux and rise of Ransomware - Linux Audit[^]


                        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                        "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                        1 Reply Last reply
                        0
                        • Richard DeemingR Richard Deeming
                          1. Block Office macros with Group Policy[^] (You'll probably need to download the Group Policy Administrative Templates for Office 2016[^]);
                          2. Change the file association for .js, .jse, .vbs, .vbe and .hta files to open with Notepad by default;
                          3. Profit! :D

                          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                          M Offline
                          M Offline
                          Mark Mondor
                          wrote on last edited by
                          #18

                          I read about this yesterday on ZDNet, it's probably not a macro, but an image (install Silverlight) that points to a Visual Basic Script instead of a URL which installs the keylogger. Details: [^]

                          Richard DeemingR 1 Reply Last reply
                          0
                          • M Mark Mondor

                            I read about this yesterday on ZDNet, it's probably not a macro, but an image (install Silverlight) that points to a Visual Basic Script instead of a URL which installs the keylogger. Details: [^]

                            Richard DeemingR Offline
                            Richard DeemingR Offline
                            Richard Deeming
                            wrote on last edited by
                            #19

                            Which is why you change the .vbs file association to open with Notepad instead of WScript. :) Still doesn't hurt to disable macros, though, since some ransomeware still uses them.


                            "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                            "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups