Trojan.Keylogger

Short bio

Trojan.Keylogger is a generic detection for applications that have the capabilities to harvest keystrokes, screenshots, network activity, and more from computers where the software is installed. Trojan.Keylogger may covertly monitor user behaviour and harvest personally identifiable information including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity.

Trojan.Keylogger may be capable of the covert collection of screenshots, video recordings, or the ability to activate any connected camera or microphone. Collected information may be stored locally and later retrieved, or may be transmitted to an online service or location.

Symptoms

Trojan.Keylogger may run as a start-up entry and may be visible as running processes on compromised machines. Alternatively, Trojan.Keylogger may also be configured in a manner which prevents visible processes and start-up entries

Type and source of infection

Trojan.Keylogger may be distributed using various methods. This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, this software may be installed by an individual with physical or remote access to the computer. Trojan.Keylogger may be installed with or without user consent.

Protection

Malwarebytes protects users from Trojan.Keylogger by using real-time protection.

block Trojan.Keylogger

Malwarebytes blocks Trojan.Keylogger

Remediation

Malwarebytes can detect and remove many Trojan.Keylogger infections without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language