Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Just found keystroke logger (klogger.exe from Kelly Software) on my work

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:20 PM
Original message
Just found keystroke logger (klogger.exe from Kelly Software) on my work
PC. I have quarantined it. Would like to know details, such as when, (registry?) where (looks like it reports to Documents and Setting/myname/recent/readme.txt.lnk a 1K shortcut which appears to point to E:

D is my CD drive

Would love to read that txt file.
Printer Friendly | Permalink |  | Top
FreakinDJ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:22 PM
Response to Original message
1. Your work PC must be networked
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:31 PM
Response to Reply #1
5. It is but I have no E drive mapped, how do I find E on the network?
Printer Friendly | Permalink |  | Top
 
FreakinDJ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:39 PM
Response to Reply #5
13. You don't have an E drive
its on the network - and NO you probably do not have rights to the file

There is nothing you can legally do about it

So just crash the computer and see what you get on the new one

Thats what I did
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:46 PM
Response to Reply #13
19. So the drives on the network that are skipped over are the secret drives?
Printer Friendly | Permalink |  | Top
 
FreakinDJ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:51 PM
Response to Reply #19
22. NO but you can only see what you are grant network RIGHTS
too.

Its kinda like a security clearance. If the network admin hasn't granted you rights to the file, no matter where the physical location you will not be allowed to see it.

Every thing is an object. Programs, files, users, are all objects
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:01 PM
Response to Reply #22
24. I only have one readme.txt.lnk in myname/recent. The shortcut
appears to point to the root of E:

The documentation on this logger says it writes logs to a *.tmp in the root of C.
Printer Friendly | Permalink |  | Top
 
FreakinDJ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:28 PM
Response to Reply #24
30. That is just where the resulting file is deposited
The actual software resides on your computer except it is awfully hard to find. Some are vulnerable to the search function if you know what you are looking for. Then you need to corrupt only a few lines of code to disable it.

Do you have a file name from the logger prog
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 07:06 PM
Response to Reply #30
31. Yeah, it's quarantined it uses sys007s.exe and sys007dll.dll
Printer Friendly | Permalink |  | Top
 
rzemanfl Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:22 PM
Response to Original message
2. Just found one on my home PC. n/t
Printer Friendly | Permalink |  | Top
 
FreakinDJ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:40 PM
Response to Reply #2
14. Do you have a jealous suspecious wife
or a girlfriend
Printer Friendly | Permalink |  | Top
 
rzemanfl Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:19 PM
Response to Reply #14
27. No, it is malware of some sort. My son is home and was on the
Net.
Printer Friendly | Permalink |  | Top
 
JuniperLea Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:26 PM
Response to Original message
3. Either your employer is monitoring your activity
Or an outside source. These keyloggers can usually be sent to someone without their knowing through an email, or an email attachment. A fake .jpg can do the same.
Printer Friendly | Permalink |  | Top
 
Turbineguy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:27 PM
Response to Original message
4. Whoa Dude!
I just found one too!!

It points to Karl.Rove@Whitehouse.gov

Just Kidding. Will Spybot S&D get rid of it?
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:32 PM
Response to Reply #4
6. I found this one with counterspy, adaware and trendmicro missed it
Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:33 PM
Response to Original message
7. I work in IT (12 years) and the best thing I have found is
Edited on Tue May-16-06 05:37 PM by bushmeat
this http://www.xblock.com/

it is the only scanner that picks up winwhatwhere and spector pro

both of which are commercial system monitors that cost hundreds of dollars

I also highly advise you to (in addition to xblock) use a registered antivirus program such as www.f-secure.com and:

use process explorer and root kit finder both of which are free at wwwsysinternals.com and excellent.
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:36 PM
Response to Reply #7
10. Apparently keylogger.exe by Kelly Software is free, does this mean
less likely planted by corporate? It is a very big Co. and doesn't use freeware
Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:38 PM
Response to Reply #10
11. yes, big corporations use licensed software but that doesn't stop
Edited on Tue May-16-06 05:40 PM by bushmeat
coworkers and bosses from using them (against company policy)

process explorer and another app (http://www.sysinternals.com/Utilities/Filemon.html) at sysinternals will tell you exactly what files are involved so long as the keylogger is actively running
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:43 PM
Response to Reply #11
16. I can't see an E: drive on the network, most of the drive letters are way
down the alphabet like J:, R: etc. How do I figure out what E is since it's only 1 drive past my CD drive.
Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:52 PM
Response to Reply #16
23. just open my computer and right click on E: and select properties
it should tell you what UNC path is mapped to that drive (if it is a network drive)
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:04 PM
Response to Reply #23
25. All I see is G,J, L,N,Q,R,T and of course A,C,D
Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:17 PM
Response to Reply #25
26. I suspect this was deliberate tampering with your PC
Edited on Tue May-16-06 06:19 PM by bushmeat
But is is possible you got the keylogger from a "bad" website, from an email worm, from an infected download, or even from a worm that is running somewhere on your corporate network. If this is the case then you may also have a Trojan virus in addition to the keylogger.

Also if you have ever purchased anything online with that PC I would cancel or report my credit cards stolen and get new numbers.

If you want the peace of mind that there was nothing else on your PC use xcleaner
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:21 PM
Response to Reply #26
28. Why me, why so long and why no action? At the very least someone
could say I surf intermittently, something the co. knows about anyways as we all do in my dept. (online)
Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 06:24 PM
Response to Reply #28
29. Unfortunately, you will probably never know the answer to that question
Printer Friendly | Permalink |  | Top
 
BlooInBloo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:33 PM
Response to Original message
8. LOL! Might wanna make sure it's not from the company...
... before doing anything about it....
Printer Friendly | Permalink |  | Top
 
mtnester Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:34 PM
Response to Original message
9. Kill it if you can
start here or Goggle it with english sites only as a return

http://www.2-spyware.com/remove-klogger.html
Printer Friendly | Permalink |  | Top
 
lindisfarne Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:39 PM
Response to Reply #9
12. I'm always suspicious of websites which I don't know which require
me to download an executable.
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:50 PM
Response to Reply #9
20. It's called kslogger.exe, here is the info on it
ksLogger

Type: Keyloggers
Severity scale: (63 / 100)
It is a relatively simple keylogger that records all user keystrokes and saves them to a file. ksLogger is created mostly for personal use and is not a real parasite. However, it is absolutely free and can be used by hackers for obvious malicious purposes. ksLogger must be manually installed. It runs on every Windows startup.

Related files: kslogger.exe, sys007s.exe, sys007dll.dll

ksLogger manual removal:
Kill processes:
kslogger.exe, sys007s.exe
Help: how to kill malicious processes

Delete registry values:
HKEY_CURRENT_USER\Software\sys007s
Help: how to remove registry entries

Unregister DLLs:
sys007dll.dll
Help: how to unregister malicious DLLs

Delete files:
kslogger.exe, sys007s.exe, sys007dll.dll
Help: how to remove harmful files

Misc:
Logs are stored in x.tmp file located in the root of the main hard disk (C:).

Printer Friendly | Permalink |  | Top
 
populistdriven Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:40 PM
Response to Original message
15. IMPORTANT!!!
Edited on Tue May-16-06 05:42 PM by bushmeat
If you suspect corporate espionage is involved you should report this to IT & HR immediately so they can examine the system and try to determine where it came from but ONLY do this if you have nothing to hide.
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:44 PM
Response to Reply #15
18. I worry about all my Bush bashing on DU, the phone calls to Kerry
headquarters in '04, the phone calls to a known and interviewed by the newspaper Bush protestor.
Printer Friendly | Permalink |  | Top
 
MADem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:51 PM
Response to Reply #18
21. Do you work for the gubmint?
They are looking to do a "closet" drawdown, and are busy finding reasons to fire people. Misuse of computers has become a biggie lately.
Printer Friendly | Permalink |  | Top
 
unhappycamper Donating Member (1000+ posts) Send PM | Profile | Ignore Tue May-16-06 05:43 PM
Response to Original message
17. You should xpost his question in the Computer Help and Support
forum. There's some pretty sharp cookies (punk intended) there.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed Apr 24th 2024, 04:09 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC