Malware Security Evasion Techniques: An Original Keylogger Implementation
Autor:
Arribas Royo, Álvaro
; Sánchez Rubio, Manuel
; Fuertes, Walter
; Callejas Cuervo, Mauro
; Estrada, Carlos Andrés
; Toulkeridis, Theofilos
Fecha:
2021Palabra clave:
Revista / editorial:
Springer Science and Business Media Deutschland GmbHTipo de Ítem:
conferenceObjectResumen:
The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware in order to create a keylogger. Afterward, we developed a customized and unpublished malware, on which we added as many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes, and creating the backdoor in the infected system. Furthermore, we added the required methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, including even the credentials of the users, without noticing them.
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
128 |
154 |
193 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
A Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Cazares, María Fernanda; Arévalo, Diana; Andrade, Roberto O.; Fuertes, Walter; Sánchez Rubio, Manuel (Lecture Notes in Networks and Systems, 2022)Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabilities. Social engineering attacks take advantage of human vulnerabilities considering that psychological factors could ... -
Protective Factors for Developing Cognitive Skills against Cyberattacks
Cazares, María; Fuertes, Walter; Andrade, Roberto; Ortiz-Garcés, Iván; Sánchez Rubio, Manuel (Electronics, 2023)Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online platforms and shifts in their psychological ... -
An Entrepreneurial Well-being Model based on GEM Data for Spain
Saiz-Alvarez, José Manuel; Coduras Martínez, Alicia; Cuervo-Arango Martínez, Carlos (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2014)The Economics of Happiness is one of the research areas of greatest growth in recent years. Throughout this work, a venture based model in which satisfaction of Spanish entrepreneurs with their professional life is performed. ...