Skip to main content
9th World Conference on Information Systems and Technologies

Full Program »

Malware Security Evasion Techniques: An Original Keylogger Implementation

This study evaluates the malware life cycle and develops a keylogger that can avoid Windows 10 security systems. Therefore, we considered the requirements of the malware to develop a keylogger. Afterward, we created a personalized and unpublished malware, which has been added to many features as necessary using the Python programming language. At the end of this process, the resulting executable program will execute three main threads responsible for collecting the screenshots, keystrokes and creating the backdoor in the infected system. Furthermore, we added the necessary methods to avoid the leading security tools used in Windows environments. Finally, we tested the executable file resulting on different websites as proof of concept in a real scenario. As a result, the keylogger has avoided Windows 10 firewalls, user account control, and the antivirus. Moreover, it gathered a significant amount of confidential information about user behavior, even the user’s credentials, without noticing them.

Alvaro Arribas Royo
Universidad Internacional de la Rioja
Spain

Manuel Sánchez Rubio
Universidad Internacional de la Rioja
Spain

Walter Fuertes
Universidad de las Fuerzas Armadas ESPE
Ecuador

Mauro Callejas Cuervo
Universidad Pedagógica Tecnológica de Colombia
Colombia

Carlos Andrés Estrada-Vásquez
Universidad de las Fuerzas Armadas ESPE
Ecuador

Theofilos Toulkkeridis
Universidad de las Fuerzas Armadas ESPE
Ecuador

 


Powered by OpenConf®
Copyright ©2002-2020 Zakon Group LLC