20bca1132_majorproject
20bca1132_majorproject
‘KEY LOGGER’
Submitted To
SUMAN
( E13883)
Submitted By
Aryan chhetri
(20BCA1132)
To Department of
UIC – BCA
DEPARTMENT OF COMPUTER
APPLICATIONS, UNIVERSITY INSTITUTE
OF COMPUTING,
CHANDIGARH UNIVERSITY, INDIA.
MARCH, 2023
1
BONAFIDE CERTIFICATE
Signature Signature
Academic designation
UIC/BCA
2
DECLARATION BY THE CANDIDATE
I hereby declare that the project report entitled “Key logger ” submitted
by group members to Department of Computer Applications, University
Institute of Computing, Chandigarh University, India in partial fulfillment of
the requirement for the award of degree “Bachelor of Computer Application
(BCA)”is a major project work carried out by me under the guidance of
Mrs.Suman .I further declare that the work reported in this project has not been
submitted and will not be submitted, either in part or in full, for the award of any
other degree or diploma in this institute or any other institute or university.
Aryan
chherti
(20BCA1132)
3
ACKNOWLEDGEMENT
4
ABSTRAT
5
सार
6
किया जाता है। इन एल्गोरिदम का उपयोग
कंप्यूटर में कीलॉगर्स के अस्तित्व का पता
लगाने के लिए किया जाता है, जो उपयोगकर्ता की
गोपनीयता और सुरक्षा को मजबूत करता है |
TABLE OF CONTENTS
Bonafide certificate……………………………….. 2
Declaration by the Candidate……………………… 3
Acknowledgement…………………………………. 4
Abstract…………………………………………….. 5
Abstract (in Hindi Language) ……………………… 6
CHAPTER 1. INTRODUCTION........................................................................ 8
1.1. Identification of Client/ Need/ Relevant Contemporary issue................................ 9-10
7
CHAPTER-1
INTRODUCTION
Key loggers also known as keystroke loggers, may be defined as the recording of the key
pressed on a system and saved it to a file, and the that file is accessed by the person using this
malware. Key logger can be software or can be hardware. Working: Mainly key-loggers are
used to steal password or confidential details such as bank information etc. First key-logger
was invented in 1970’s and was a hardware key logger and first software key-logger was
developed in 1983. 1. Software key-loggers : Software key-loggers are the computer programs
which are developed to steal password from the victims computer. However key loggers are
used in IT organizations to troubleshoot technical problems with computers and business
networks. Also Microsoft windows 10 also has key-logger installed in it.
JavaScript based key logger – It is a malicious script which is installed into a web page,
and listens for key to press such as oneKeyUp(). These scripts can be sent by various
methods, like sharing through social media, sending as a mail file, or RAT file.
Form Based Key loggers – These are key-loggers which activates when a person fills a
form online and when click the button submit all the data or the words written is sent via
file on a computer. Some key-loggers works as a API in running application it looks like a
simple application and whenever a key is pressed it records it.
1. Hardware Key-loggers : These are not dependent on any software as these are hardware
key-loggers. keyboard hardware is a circuit which is attached in a keyboard itself that
whenever the key of that keyboard pressed it gets recorded.
USB keylogger – There are USB connector key-loggers which has to be connected to a
computer and steals the data. Also some circuits are built into a keyboard so no external
wire i used or shows on the keyboard.
Smartphone sensors – Some cool android tricks are also used as key loggers such as
android accelerometer sensor which when placed near to the keyboard can sense the
vibrations and the graph then used to convert it to sentences, this technique accuracy is
about 80%. Now a days crackers are using keystroke logging Trojan, it is a malware which
is sent to a victims computer to steal the data and login details.
8
1.1 Identification of Client/ Need / Relevant Contemporary issue
Keyloggers are tools that can record every keystroke that you type into a computer or mobile
keyboard. Because you interact with a device primarily through the keyboard, keyloggers can
record a lot of information about your activity. For example, keyloggers can track credit card
information that you enter, websites you visit and passwords you use.
Keyloggers aren’t always used for illegal purposes. Consider the following examples of legal
uses for keylogging software:
Companies often use keylogger software as part of employee monitoring software to help
track employee productivity.
While there are legal uses for keyloggers, malicious users commonly use keyloggers to
monitor your activity and commit cybercrimes.
When keyloggers run, they track every keystroke entered and save the data in a file. Hackers
can access this file later, or the keylogger software can automatically email the file to the
hacker. Some keyloggers, which are called screen recorders, can capture your full screen at
random intervals as well.
9
Danger of Keystroke Loggers
Unlike other forms of malware, keylogging malware doesn’t damage your computer or
operating system. The main danger of keyloggers is that malicious users can identify and
exploit your personal information. The following examples illustrate some of the risks of a
keylogger attack:
Hackers can steal credit card information and make unauthorized purchases.
Malicious users can log in to your email accounts and steal information or scam your
contacts.
Hackers can log in to your bank accounts and transfer money out.
Malicious users can access your company’s network and steal confidential information.
According to the Federal Bureau of Investigation, nearly every national security threat and
crime problem that they face includes a cyber component. A common threat that the FBI sees
across a variety of industries is a business email compromise. In this kind of attack, threat
actors send an email that looks like it’s coming from a known contact. Then, they use social
engineering and network intrusions to infiltrate companies.
One example of a business email compromise is when a criminal sends a message that appears
to come from a known vendor. The message might include an invoice with a changed mailing
address. If you don’t recognize the fraud, you could send payments to the wrong recipients.
Cybercriminals with access to your accounts from keylogger attacks can be more successful
because they can better imitate messages from vendors.
That’s why cybercriminals often use keyloggers to identify targets. By using a keylogger,
cybercriminals can understand more about their victim to help guide a sophisticated
attack. Social engineering strategies are more successful when cybercriminals use personal
and business information to gain the victim’s trust.
1
1.2 Identification of Problem
Types of Keyloggers
Hardware keyloggers are physical devices that record every keystroke. Cybercriminals can
disguise them in the computer cabling or in a USB adapter, making it hard for the victim to
detect. However, because you need physical access to the device to install a hardware
keylogger, it isn’t as commonly used in cyberattacks.
Software keyloggers don’t require physical access to a device. Instead, users download
software keyloggers onto the device. A user might download a software keylogger
intentionally or inadvertently along with malware.
There are many different varieties of software keyloggers, including the following types:
Form-grabbing keyloggers record data entered into a field. This type of keylogging
software is typically deployed on a website rather than downloaded on a victim’s
computer. A hacker might use form grabbing keyloggers on a malicious website that
prompts victims to enter their credentials.
JavaScript keyloggers are written in JavaScript code and injected into websites. This type
of keylogging software can run scripts to record every keystroke entered by website
visitors.
1
How Keyloggers Work
Keyloggers are spread in different ways, but all have the same purpose. They all record
information entered on a device and report the information to a recipient. Let’s take a look at a
few examples showing how keyloggers can spread by being installed on devices:
Web page scripts. Hackers can insert malicious code on a web page. When you click an
infected link or visit a malicious website, the keylogger automatically downloads on your
device.
Phishing. Hackers can use phishing emails, which are fraudulent messages designed to
look legitimate. When you click an infected link or open a malicious attachment, the
keylogger downloads on your device.
Unidentified software downloaded from the internet. Malicious users can embed keyloggers in
software downloaded from the internet. Along with the software you want to download, you
unknowingly download keylogging software.
Safe Keyloggers
Keyloggers have a reputation of criminality, but there are safe and legal uses for keyloggers.
While laws vary depending on the state or country, keyloggers are generally considered legal
if you own the device. For example, you can monitor office computers if you own the
business. Similarly, you can monitor your own computer even if other people use it. However,
you cannot monitor a family member’s computer without his or her knowledge.
Another use case for safe and legal keylogging is during ethical hacking. Ethical hacking is a
strategy where a hacker attempts to legally break into computers or networks. Organizations
might use this strategy to test their cybersecurity.
It’s therefore important to protect yourself from keyloggers so you don’t become a victim. The
good news is that you can reduce the likelihood of an attack with behaviors and precautions.
According to Verizon’s 2022 Data Breach Investigations Report, 82% of breaches involve a
human element. By being aware of the dangers, you can bolster your cybersecurity and better
protect yourself against keylogging attacks.
How to Protect Yourself Against Keylogging Attacks on Personal Devices
The best protection against keylogging attacks is education about how the attacks occur.
Consider the following precautions you can take to avoid becoming a victim:
Verify that emails are sent from legitimate sources. Check for unusual email addresses and
consider whether requests are legitimate. For example, question whether your bank would
ask you to reset your password in an email. When in doubt, avoid clicking the link. You
can still perform the requested action, such as resetting your password, directly from your
bank’s portal.
Verify that websites are legitimate. Cybercriminals often create convincing fake versions
of popular websites. Before entering personal information, such as a social security
number, check that the website has a digital certificate to validate its security.
Use a unique and strong password. It’s important to use unique passwords so that
cybercriminals don’t have access to all your accounts if a password is compromised.
Once a cyber criminal has got hold of confidential user data, s/he can easily
transfer money from the user’s account or access the user’s online gaming account.
Unfortunately access to confidential data can sometimes have consequences which are far
more serious than an individual’s loss of a few dollars. Keyloggers can be used as tools in both
industrial and political espionage, accessing data which may include proprietary commercial
information and classified government material which could compromise the security of
1
commercial and state-owned organizations (for example, by stealing private encryption keys).
One of the most publicized keylogging incidents recently was the theft of over
$1million from client accounts at the major Scandinavian bank Nordea. In August 2006
Nordea clients started to receive emails, allegedly from the bank, suggesting that they install
an antispam product, which was supposedly attached to the message. When a user opened the
file and downloaded it to his/ her computer, the machine would be infected with a well known
Trojan called Haxdoor. This would be activated when the victim registered at Nordea’s online
service, and the Trojan would display an error notification with a request to re-enter the
registration information. The keylogger incorporated in the Trojan would record data entered
by the bank’s clients, and later send this data to the cyber criminals’ server. This was how
cyber criminals were able to access client accounts, and transfer money from them. According
to Haxdoor’s author, the Trojan has also been used in attacks against Australian banks and
many others.
On January 24, 2004 the notorious Mydoom worm caused a major epidemic.
MyDoom broke the record previously set by Sobig, provoking the largest epidemic in Internet
history to date. The worm used social engineering methods and organized a DoS attack on
www.sco.com; the site was either unreachable or unstable for several months as a
consequence. The worm left a Trojan on infected computers which was subsequently used to
infect the victim machines with new modifications of the worm. The fact that MyDoom had a
keylogging function to harvest credit card numbers was not widely publicized in the media.
1
In early 2005 the London police prevented a serious attempt to steal banking
data. After attacking a banking system, the cyber criminals had planned to steal $423 million
from Sumitomo Mitsui’s London-based offices. The main component of the Trojan used,
which was created by the 32-year-old Yeron Bolondi, was a keylogger that allowed the
criminals to track all the keystrokes entered when victims used the bank’s client interface.
In May 2005 a married couple was arrested in London who were charged with
developing malicious programs that were used by some Israeli companies in industrial
espionage. The scale of the espionage was shocking: the companies named by the Israeli
authorities in investigative reports included cellular providers like Cellcom and Pelephone,
and satellite television provider YES. According to reports, the Trojan was used to access
information relating to the PR agency Rani Rahav, whose clients included Partner
Communications (Israel’s second leading cellular services provider) and the HOT cable
television group. The Mayer company, which imports Volvo and Honda cars to Israel, was
suspected of committing industrial espionage against Champion Motors, which imports Audi
and Volkswagen cars to the country. Ruth Brier-Haephrati, who sold the keylogging Trojan
that her husband Michael Haephrati created, was sentenced to four years in jail, and Michael
received a two-year sentence.
There are many more examples of cyber criminals using keyloggers – most
1
financial cybercrime is committed using keyloggers, since these programs are the most
comprehensive and reliable tool for tracking electronic information.
The fact that cyber criminals choose to use keyloggers time and again is
confirmed by IT security companies.
One of VeriSign’s recent reports notes that in recent years, the company has
seen a rapid growth in the number of malicious programs that have keylogging functionality.
One report issued by Symantec shows that almost 50% of malicious programs
detected by the company’s analysts during the past year do not pose a direct threat to
computers, but instead are used by cyber criminals to harvest personal user data.
According to research conducted by John Bambenek, an analyst at the SANS
Institute, approximately 10 million computers in the US alone are currently infected with a
malicious program which has a keylogging function. Using these figures, together with the
total number of American users of e-payment systems, possible losses are estimated to be
$24.3 million.
Most modern malicious programs are hybrids which implement many different
technologies. Due to this, any category of malicious program may include programs with
keylogger (sub)functionality. The number of spy programs detected by Kaspersky Lab each
month is on the increase, and most of these programs use keylogging technology.
1.4 Timeline
1st-2nd week:
1
1