<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Blog</title><link>https://www.cybertense.com:443/blog</link><description></description><item><title>The growing popularity of targeted attacks and how to fend them off; detecting lateral movement – Part 2</title><link>https://www.cybertense.com:443/blog/the-growing-popularity-of-targeted-attacks-and-how-to-fend-them-off-detecting-lateral-movement-part-2</link><description>&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;In our &lt;a href="https://www.cybertense.com/blog/the-growing-popularity-of-targeted-attacks-and-how-to-fend-them-off"&gt;previous post&lt;/a&gt;, we made clear how the current threat landscape is changing. From a situation where frequent hit-and-run mass malware seems to do the most harm, we expect more targeted attacks to show up during coming years. After penetrating into the network, the first aim of the cybercriminal is to gather access to multiple systems to gain some redundancy in case some systems become unaccessible later on. Or, tries to execute additional tools, access specific information or files or access to additional credentials. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;However, before an attacker gains power it has to overcome various barriers. &lt;br&gt;&lt;br&gt;Computer scientists at Lockheed-Martin corporation presented a model to concretize the various phases a cyberattacker has to run through before ultimately succeeding. The so-called Cyber Kill Chain. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Although an attacker may overleap a phase, the layered model gives a perfect opportunity to build up confidence detecting the various attacks passing by. The idea is, that these phases are involved in a cyber attack:&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;1 - Initial Reconnaissance: In this phase, reseach is done to identify vulnerabilities and weak spots&lt;br&gt;
2 - Weaponization: Here, the attacker tailors a dedicated piece of malware, possibly exploiting multiple vulnerabilities&lt;br&gt;
3 - Delivery: making sure the specilized weapon is available at the right place / spot (via e-mail attachments, websites or USB drives)&lt;br&gt;
4 - Exploitation: trigger the malware to become active, starting an attack utilizing packed intel or expoiting various systems' vulnerabilities&lt;br&gt;
5 - Installation: foot on the ground; installing backdoors / ways to connect to the target network comfortably and unnoticed &lt;br&gt;
6 - Command and Control: At this stage, backdoors are in place an C2 traffic is clearly applicable; attack is imminent.&lt;br&gt;
7 - Actions on target: Attacker takes action to meet his objective(s), such as data exfiltration, data destruction, or encryption for ransom.&lt;/font&gt;&lt;br&gt;
&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;In phase 3 - 5, we have the best chance detect some devaint behaviour on our network indicating an attack is in the making. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;In fact, detecting the lateral movement attack phase represents the single most important differentiator between a simple attack or a sophisticated targeted and strategic attack. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;We will now present some steps you may want to set up to detect lateral movement, which enables you to take action.&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;A. Know default behaviour and utililized techniques of your network administrator (team)&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Don’t fool yourself, but be sure an attacker has done its’ homework preparing an APT and knows &lt;em&gt;very&lt;/em&gt; well which default tools are active and used by the network administrators. These are the tools, techniques and services ideally used by the hacker to stay under the radar. Two things are key here:&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;A1. Know which logging is available and see if you can dump these various logs to a convenient location, from where you can work with this data. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;A2. Know what behaviour is expected. You can automate behavioural detection (AI) or can manually create a list of this. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Ultimately, here you want to detect deviations on this default behaviour. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;B. Use login logs as a pre-attack indicator&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;You should analyze login information from differen locations (AD sites) and have a method to cross reference these data. If, for example, you encounter a typical credential failing login over multiple systems and/or sites, you are on to something. If you encounter failing logins during non-working hours you have another indication. So, search for methods to analyze this data – automated or manually – since it really is a strong indication of the pre-attack, lateral movement, phase. &lt;/font&gt;&lt;/p&gt;&lt;font face="Arial" size="4"&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;C. Analyze login information on authentication &lt;u&gt;frequency&lt;/u&gt;&lt;/strong&gt; &lt;/p&gt;&lt;p&gt;This point has some overlap with point B. You should not only know which credentials are used, but an even better indication is the frequency in which a certain credential set is used throughout the network. When lateral movement occurs, an attacker is in search of jewels and already has valid access. However, he/she does not have &lt;em&gt;that much&lt;/em&gt; credentials in this phase. So, the attacker will have to reuse the same valid credential(s) frequently when moving laterally through the network. &lt;/p&gt;&lt;p&gt;Find that characteristic and you gained another strong indicator!&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;D. Know your file servers’ activity&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Here, again, we want to analyze the utilization of File Servers. Hackers do often persist confidential data (encrypted and hidden) to a file server before transferring these jewels to their own C2 server. File servers are also often target for ransomware attacks or may simply harbor some of the jewels the attacker is fighting for. This results in deviance behaviour on the file server(s). &lt;br&gt;So again, focus on log aggregation and analyze them heavily!&lt;/p&gt;&lt;p&gt;Windows systems generally have hidden network shares that are accessible to (network) administrators and provide the ability for remote file copy and other administrative functions; take measures to log access to especially these locations - C$, ADMIN$ and IPC$. Windows has special GPO’s to log these access moments, but you need to invest in tooling / time to aggregate these logs. &lt;p&gt;After an attacker succeeds in transferring binaries (malware) to a certain computer, most times remote execution methods are utilized short after to activate the (stealthy?) malware. &lt;p&gt;Don’t underestimate the value of SMB logging and analysis; they could be a very very strong indicator / detector. First take measure to gather all logs to a comfortable place, then invest time and build knowledge to interpret and aggregate these logs.&lt;p&gt;&lt;strong&gt;&lt;em&gt;Shared files on these network shares&lt;/em&gt;&lt;/strong&gt;&lt;p&gt;An attacker may taint files and executables (content) on a network share. Since a multitude of users will execute or open these files, a file infected or tainted to run malicious script / code / macros will have a large impact. Since the attacker wants to stay stealthy, he has to carefully plan this kind of tricks. So, frequently scan your files on your fileserver and keep track on anomalies.&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;E. Command and Control activity detection&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Certainly, you may have some great tools in place like firewalls doing protocol inspections. Downside of these appliances is – however they give a big plus to your overall security set – they are often behind on threat intel. This latter is certainly the case when you face an APT. Here, your effort to analyse DNS logs may give you strong hints. Try to detect non-human hostnames / domainnames; the ones randomly generated may be of interest. &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;F. Port scanning&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;You have to be aware of port scanning activity within your network. True, some legit applications may do a scan or may be classified as a port scanning application. However these applications may have a static behaviour and only scan for certain ports or ranges. A port scan set out by a cybercriminal and its’ tools will – if noticed – probably always differ from known behaviour!&lt;/p&gt;&lt;p&gt;Make sure you analyze this utilizing &lt;br&gt;&lt;/p&gt;&lt;/font&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;G. Exploiting vulnerabilities&lt;/strong&gt; &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Most of the time, an attacker needs to gather knowledge about systems exposing known vulnerable services. The attacker utilizes network service scanning software or home brewn methods and software to discover these unpatched services. An attacker may also search for patch history in which case a safe assumption can be done on which systems and services to exploit. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;So, it is of uttermost importance to patch all software continuously. Then, invest time in knowing which techniques attacker use during this phase and build intel about the traces these may leave, enabling you to monitor and detect this kind of traffic.&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;H. Keep an eye on RDP &lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Lately, many attacks ‘simply’ encompass the use of RDP to take over a certain system, drop malicious code and executing it. The attacker may also just enable legit features to have the ability to control the computer more stealthy. Know your group policies, track for anomalies. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;With this summation, we hope to give you some inspiration on the various attack vectors and techniques involved with a stealty lateral movement attacks. We deliberately avoided giving advice on various commercially available (open source) tools en software suites. But, of course we like to give you advice on these software. We can also advice on several free / value for money solutions. Just send us an e-mail. We will deliver. &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Greetings from the CyberTense team.&amp;nbsp; &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Regards and keep up,&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Marieke &lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;font face="Arial" size="4"&gt;&lt;/font&gt;</description><pubDate>Wed, 08 May 2019 20:04:00 GMT</pubDate><guid isPermaLink="true">https://www.cybertense.com:443/blog/the-growing-popularity-of-targeted-attacks-and-how-to-fend-them-off-detecting-lateral-movement-part-2</guid></item><item><title>The growing popularity of targeted attacks and how to fend them off – Part 1</title><link>https://www.cybertense.com:443/blog/the-growing-popularity-of-targeted-attacks-and-how-to-fend-them-off</link><description>&lt;p&gt;&lt;br&gt;&lt;font face="Arial" size="4"&gt;In this multi-part post, we will argue the growing trend of these attacks and emphasize the importance of detecting aimed cyberattacks early stage. Next post will highlight some interesting techniques to empower you in preventing these &lt;/font&gt;&lt;p&gt;&lt;i&gt;&lt;br&gt;&lt;/i&gt;&lt;font face="Arial" size="4"&gt;In this part, we want to focus on aimed attacks, in which case a cybercriminal intentionally targets its strength to compromise certain systems or organizations. These so called APTs (Advanced Persistence Threats) have long been associated with specialized teams setting out these delicate attacks, driven by government and/or military. The idea of a state-backed attack - often called nation-state attacks – aiming at primarily military complexes of diplomatic data to gather specific competitive intel is somewhat out-of-date. Sometimes a nation-state attack is simply put in motion to disrupt organizations or geographic districts. We will focus on this kind of &lt;i&gt;advanced&lt;/i&gt; attacks, which will – as we foresee – grow in numbers coming time. &lt;/font&gt;&lt;p&gt;&lt;i&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;&lt;br&gt;Advanced&lt;/strong&gt;&lt;/font&gt;&lt;/i&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;It is true that real sophistication needs time, dedication and stamina; factors most likely to be expected with specialized nation-state hackers. On the other hand, cybercriminals are strengthening their weaponry with freely available sophisticated techniques. Like the powerful NSA exploits disclosed online by Shadow Brokers, resulting in the use of the EternalBlue and EternalRed exploits and resulting in a wide spread of ransomware and crypto mining attacks. Even after all necessary patches became available, these days hundreds of thousands of computers are unpatched and vulnerable. Last years, attackers heavily invested in automating attacks using a wide range of known exploitable vulnerabilities, in their attempt to rapidly attack targets and evade internal security measures or protections at the network and endpoint level. This use of automation has taken on myriad forms, from exploit kits that trap browsers and weaponized Office document files to malicious spam email that thoroughly obfuscates the threat it poses to victims and their technology. [2]&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;This combination forms a dangerous cocktail and we may expect the &lt;i&gt;average&lt;/i&gt; cybercriminal to advance their attack techniques even more coming years. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;US Director of National Intelligence Daniel R.Coats recently said: “The potential for surprise in the cyber realm will increase in the next year and beyond as billions more digital devices are connected—with relatively little built-in security—and both nation states and malign actors become more emboldened and better equipped in the use of increasingly widespread cyber toolkits.” [1]&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;So, it is clear how the cyberattacks may advance over time in order to penetrate into organizations.&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;But considering this all, we must pay attention to traditional criminology and ask ourselves which commonalities both nation-state hackers and the broader hacker scene have; what is their common motive. We think the answer is &lt;i&gt;the potential to act disruptive&lt;/i&gt;. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;While large-scale cyber-attacks like ransomware expanded in scope and popularity last year, this form of disruption in order to steal and extort has a fairly low risk/reward ratio. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;So, even the average hacker is gradually realizing that there are better ways to accomplish its’ goals with lesser risks.&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;And here &lt;i&gt;persistence &lt;/i&gt;comes to play.&lt;/font&gt;&lt;p&gt;&lt;i&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/i&gt;&lt;p&gt;&lt;i&gt;&lt;font face="Arial" size="4"&gt;&lt;strong&gt;Persistence&lt;/strong&gt;&lt;/font&gt;&lt;/i&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;One of the first steps after penetrating a network may be ensuring some or more systems stay accessible to the hacker. In this phase, flying under the radar is top priority of the attacker. Typically, the attacker tries to utilize some ‘features’ the network and applied software may expose. Oftentimes - after gathering some credentials - very common technologies, like WMI, may be used to distribute malicious software throughout the network or to specific machines. &lt;br&gt;Even when you correctly maintain your network and steer it safe through clever security procedures, simple mistakes may lead to data being sent to false recipients. Also, devices may get lost and valuable information may leak to a cybercriminal. Or the cybercriminal simply sharpens his attack through social hacking. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Ultimately the attacker may penetrate the network though and will continue moving further into the network, searching for even better credentials or critical business data. &lt;/font&gt;&lt;p&gt;&lt;i&gt;&lt;font face="Arial" size="4"&gt;Lateral movement and - distribution; Why detecting lateral movement stays of utter importance&lt;/font&gt;&lt;/i&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;We like to focus to common techniques the attacker often utilizes during its’ attacks. One very common technique is called Lateral movement. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;In fact, 80% of a sophisticated attack involves moving laterally through the network from system to system. The lateral movement phase is the point where the attacker is most vulnerable to detection. They are operating semi-blind on a foreign network, seeking out targets of value and try to gather better credentials to set out the lateral movement actions even more successful. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;The attacker is typically using built-in capabilities of the operating system and legitimate remote administration tools to move around the network. This prevents anti-malware and endpoint detection systems from flagging their activity as it looks perfectly normal.&lt;br&gt;It’s thus clear that the defense should have best-in-class lateral movement detection capabilities.&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;In 2018, there was a clear use of the EternalBlue vulnerability. First WannaCry ransomware heavily used EternalBlue to spread fast throughout the computer network, like a worm. Lateron, also so-called cryptojacker made use of this same vulnerability to spread fast and misuse hardware to mine coins for the attacker. This type of malware had a characteristic to spread as fast as possible, infecting all computers along its path. This worm-alike form used lateral distribution as its’ strategy. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;But, as we already said, we more and more see very clever thought through attacks where the cyber attacker aims at the crown jewels of the organization and may have very nifty tactics to extort an organization with very dangerous threats. Neglecting the demands brought forward by the cybercriminal eventually, may feel like the deathblow to your company. And the matter of fact is, that the attacker may have ‘obtained’ very business critical data at that stage.  So, prevention is key!&lt;/font&gt;&lt;p&gt;&lt;i&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;Conclusion&lt;/font&gt;&lt;/i&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;As a home user, you should consider using a bulletproof anti-exploit solution with a strong reputation. Another additional measure would be to use an alternative DNS server, which offers filtering of malware domains like Quad9, Cloudflare, OpenDNS or equal services. We would be happy to advise you. Just drop us a &lt;a href="mailto:Marieke@CyberTense.com"&gt;mail&lt;/a&gt; or use our &lt;a href="https://www.cybertense.com/Support" target="_blank"&gt;web form&lt;/a&gt;. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;As a business, we would like to get in touch and give you some valuable tips to strengthen your current security measures and possibly enrich them utilizing proven strategies. For actual implementations, we work together with renowned partners in the Netherlands and could just give you a tip or direction – if appropriate. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Next post, we will dive into the actual techniques used and how to protect yourself and your organization agains these aimed attacks. &lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;At your service!&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;Cheers,&lt;br&gt;Marieke&lt;/font&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;[1] &lt;/font&gt;&lt;a href="https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF"&gt;&lt;font face="Arial" size="4"&gt;https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF&lt;/font&gt;&lt;/a&gt;&lt;p&gt;&lt;font face="Arial" size="4"&gt;[2] &lt;/font&gt;&lt;a href="https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-2019-threat-report.pdf"&gt;&lt;font face="Arial" size="4"&gt;https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-2019-threat-report.pdf&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Thu, 21 Feb 2019 10:40:00 GMT</pubDate><guid isPermaLink="true">https://www.cybertense.com:443/blog/the-growing-popularity-of-targeted-attacks-and-how-to-fend-them-off</guid></item><item><title>What are keyloggers? Why are they a threat to us?</title><link>https://www.cybertense.com:443/blog/what-are-keyloggers-why-are-they-a-threat-to-us</link><description>&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family: Arial;" face="Arial"&gt;Keyloggers are a type of&lt;/span&gt; malware designed to monitor all the keystrokes you make. Actually, they are one of the oldest forms of threats within our modern computer era. Whether they are put to work on a legitime way or they got deployed to your computer illegally, you want to get rid of them &lt;strong&gt;in any case&lt;/strong&gt;. Physical keyloggers are impossible to detect by software, only uncommon changes in detected (keyboard) hardware are, which is an approach some vendors dodgy embed in their solutions. We can help you choosing the right solution, but we will target &lt;em&gt;software&lt;/em&gt; keyloggers in this article.&lt;/p&gt;
&lt;p&gt;Our personal information is at risk when confronted with a keylogger. In fact, any individual or organisation that accesses, inputs or stores private information is at risk. They are ideal tools for industrial espionage or for accessing confidential data and can damage relationships, financial standing, and reputation as a result.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More than meets the eye&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Even seemingly innocent information can be used as jumping-off point for bigger targeted attacks in the hands of a cybercriminal with perseverance. Eventually they will gather the information needed to start off their big hack / attack.&lt;/p&gt;
&lt;p&gt;With that in mind, the &lt;em&gt;detection&lt;/em&gt; &lt;em&gt;alone &lt;/em&gt;has great value; you / your company may be victim of a long, well thought trough cyber attack.&lt;/p&gt;
&lt;p&gt;Furthermore, when you got infected by keylogging malware, you maybe victim to other malicious programs since keyloggers are often packed with other malware as an option to capture your personal information.&lt;/p&gt;
&lt;p&gt;But how can keyloggers end up on our machines without our notion? Traditionally, keyloggers have been pieces of software, which can be installed on a computer through a virus or as spyware. A common approach nowadays is the use&amp;nbsp; of spear phish attacks, where a user gets tricked into clicking a weblink which will eventually redirect them to a server analyzing the vulnerabilities on the users&amp;rsquo; application, like a unpatched or out-of-date webbrowser.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Staying under the radar&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A keylogger is one of the malicious types of malware trying to stay under the radar; nearly every keylogger has special techniques to keep stealthy. Keyloggers are present at either kernel- or user-level. Since user-level keyloggers mostly hook one of the Windows API functions to determine which key is pressed, they are fairly easy to detect. Kernel-level keyloggers focus on monitoring system calls. The latter family of keyloggers are more difficult to detect, but lately more sophisticated variants are to be found, like GPU enabled keyloggers.&lt;/p&gt;
&lt;p&gt;Since most detection engines primarily support analysis of x86 code and mainly focus on main memory and CPU, the idea for malware to co-exist on (also) the GPU gains a lot of attention to malware engineers in their pursuit of staying stealthy.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;How to protect / react?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When you already assume being fallen victim to malicious software, you will need the right tools to assist you cleaning up your computer. We can assist and direct you the right way.&lt;/p&gt;
&lt;p&gt;If, however, you want to take preventive measures, we advise you to start off with usage of a strong anti-exploit solution. This, combined with an adequate anti-virus engine, may prove a perfect fit.&lt;/p&gt;
&lt;p&gt;Please contact us via the support form to let us advise you. Have a nice day.&lt;/p&gt;</description><pubDate>Sun, 16 Dec 2018 21:04:00 GMT</pubDate><guid isPermaLink="true">https://www.cybertense.com:443/blog/what-are-keyloggers-why-are-they-a-threat-to-us</guid></item></channel></rss>