Banking key-logger malware has become more and more common place in a society dominated by online banking. Consequently, as more and more people crowd onto the internet for internet banking, hackers are developing new ways to access sensitive user data. Recently, Unit 42 security researchers uncovered a new form of security exploiting software. Its one of a number of Multi-vector attacks that exploit users in a variety of ways. Dubbed Lucifer, it attaches itself to the host PC and watches for sensitive user data to harvest.
The Key-loggers Process of execution
Once the Trojan has infected a machine, it has a list of 3 actions it executes.
Firstly, it rapidly protects itself using sophisticated anti-analysis techniques, splitting malicious code into multiple files and locations, making it difficult to detect.
Secondly, it uses a key-logger to record sensitive information and takes screenshots of key websites.
Thirdly, Lucifer attempts to harvest emails, usernames, passwords, credit card information and other account details.
It is noted that Lucifer targets several accounts including Google, Facebook and Netflix.
As the malware records this data, it uses those accounts to spread itself to any friends on your now compromised social media accounts.
How does a Key-logger infect my computer?
Key-logger malware is spreads by spam campaigns, illegal activation tools, fake updater’s and untrustworthy download channels.
We highly advise that you avoid any untrustworthy websites and immediately delete any emails that look unusual. Additionally it we recommend to only use official and verified download channels. Furthermore, all products must be activated and updated with functions/tools provided by genuine developers. Crucially, it is vital to have a dependable anti-virus/anti-spyware suite installed to protect you, particularly from pesky Key-loggers.
If you do feel like you have been infected, please contact Techbug on 1300 655 121. We can assist you or your business to remove anything unusual from you computer.