Request a Demo

What Is a Keylogger Detector and How It Works

A Keylogger (also called Keystroke Logger) refers to the software (even hardware) that's used to read every keystroke that's made to a log file on a system and is used to read and record even encrypted communication.

A keylogger can be downloaded on purpose to a system by someone (an employer who wants to do surveillance on an employee) who wants to monitor activity on a computer or it can be downloaded unwittingly as spyware. Then the keylogger would be executed as part of a rootkit or remote administration (RAT) Trojan horse.

A keylogger would comprise of two files- a DLL (Dynamic Link Library) file, which does all the recording and an EXE (Executable) file that installs the DLL file and triggers it to work. Both these files would get installed in the same directory. The keylogger would record each keystroke the user types and then would upload the information over the Internet periodically to the hacker (employer) who had got the program installed. (Keylogger, as a hardware device, would be a small battery sized plug hid and connected between the keyboard and computer and would record each keystroke and save it as text in its own miniature hard drive)

Comodo Keylogger Detector

What Is a Keylogger Detector and How It Works

Companies today are familiar with threats and those attacks that are used to steal information, but most of them don’t realize that a keylogger, which can be a hardware device or software, could be used to every keystroke from their keyboard. It can be used to capture:

  • Typed messages, such as emails, memos, letters
  • Passwords and usernames
  • Credit card numbers
  • Forms that you fill in with names, birthday and other information
  • Email addresses

At Comodo, we realize how frightening this can be and would want to help you keep your information safe. While most keylogging is done through malware and isn’t a good thing, there are some times where employers can use it to monitor employees.

How It Gets on the Computer

Keylogging doesn’t happen by accident. Someone somewhere would have opened a mail with malware attached or went to a malware-ridden website. Many times, these keyloggers function as a Trojan virus that downloads harmful software, including the keylogger. They are popular with criminals because they can use them to steal all sorts of sensitive data.

Hardware keyloggers require a device to be placed on the computer back with a USB cable. In most cases, you would think you'd be able to notice this device, but it can be hidden under a desk or behind the computer, and most employees don’t check every day.

How to Detect Them

These keylogger threats can be very detrimental to a company, so you should take precautions against them at all times. A keylogger detector, like ours, will be able to tell if someone is intercepting your messages or other information. Because it is another form of malware, a malware detecting software will be able to find and remove it for you. If you are worried about hardware keyloggers, make sure that all employees check their computers before starting the day’s work. Contact us for more information today.