Keyloggers wait for certain Web sites to be visited - a banking site, for instance, or a credit card account online - or for certain keywords to be entered - "SSN," for example - and then spring to life.
The key stroke monitoring software are often hidden inside ordinary software downloads, e-mail attachments or files shared over peer-to-peer networks. They can even be embedded in Web pages.
Police in Brazil arrested people (including minors) for seeding other computers with keyloggers that recorded their typing whenever they visited their banks online and sent the stolen user names and passwords back to members of the gang.
A similar ring in Russia used keylogging software planted in e-mail messages and hidden in Web sites to draw over $1.1 million from personal bank accounts in France.
Get Google Anti-Phishing Firefox Extension
Read full story @ NYTimes
The key stroke monitoring software are often hidden inside ordinary software downloads, e-mail attachments or files shared over peer-to-peer networks. They can even be embedded in Web pages.
Police in Brazil arrested people (including minors) for seeding other computers with keyloggers that recorded their typing whenever they visited their banks online and sent the stolen user names and passwords back to members of the gang.
A similar ring in Russia used keylogging software planted in e-mail messages and hidden in Web sites to draw over $1.1 million from personal bank accounts in France.
Get Google Anti-Phishing Firefox Extension
Read full story @ NYTimes