Malware Security Evasion Techniques: An Original Keylogger Implementation
Autor:
Arribas Royo, Álvaro
; Sánchez Rubio, Manuel
; Fuertes, Walter
; Callejas Cuervo, Mauro
; Estrada, Carlos Andrés
; Toulkeridis, Theofilos
Fecha:
2021Palabra clave:
Revista / editorial:
Springer Science and Business Media Deutschland GmbHTipo de Ítem:
conferenceObjectResumen:
The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and unpublished malware, on which we added as many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes, and creating the backdoor in the infected system. Furthermore, we added the required methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, including even the credentials of the users, without noticing them.
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
128 |
154 |
42 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
A Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Cazares, María Fernanda; Arévalo, Diana; Andrade, Roberto O.; Fuertes, Walter; Sánchez Rubio, Manuel (Lecture Notes in Networks and Systems, 2022)Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabilities. Social engineering attacks take advantage of human vulnerabilities considering that psychological factors could ... -
An Entrepreneurial Well-being Model based on GEM Data for Spain
Saiz-Alvarez, José Manuel; Coduras Martínez, Alicia; Cuervo-Arango Martínez, Carlos (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2014)The Economics of Happiness is one of the research areas of greatest growth in recent years. Throughout this work, a venture based model in which satisfaction of Spanish entrepreneurs with their professional life is performed. ... -
Variation of the Heartbeat and Activity as an Indicator of Drowsiness at the Wheel Using a Smartwatch
Ríos Aguilar, Sergio; Miguel Merino, José Luis; Millán Sánchez, Andrés; Sánchez Valdivieso, Álvaro (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2015)Sleepiness is one of the first causal factors of accidents. An estimated 10-30% of road deaths are related to fatigue driving. A large number of research studies have been conducted to reduce the risk of accidents while ...