Limited time offer









What Do Ransom Demands And Keyloggers Have In Common?

They’re in cahoots! Reveton malware developers have added keylogging to their ransom demands. This new addition acts as a backup tactic in situations when victims refuse to pay up when held at ransom. Microsoft discovered this tactic in late-May and reportedly, this new method is distributed using the Blackhole Exploit Kit.

How does it work?

This particular piece of malware is initiated by sending up a localized lock screen on your device that demands money under fake pretenses – typically something around a police fine for a fake computer offence. As you sit there racking your brain as to what you possibly could have done to warrant a warning fine from your local police department,  Reveton is operating in the background to download a password-stealing component that scours your entire system for any and all of your logins, including FTP sites, gaming, email, social media and banking. The keylogger aspect makes this piece of malware even more irritating than it was without it. Even if you discover and uninstall the malware, the keylogger component will continue to work. In other words, the cybercriminals will continue to covertly watch and record everything you do on your computer. Fortunately, there are ways to get rid of the keylogger component, and yes you guessed it – BullGuard to the rescue! BullGuard Internet Security is a package – or as it is called, a suite – of the security tools you need to stay safe online. Keylogger removal is an important part of our suite and the ability to remove keyloggers is vital to keeping your personal information private and not letting it get into the hands of cyber criminals. Not only will our security suite help keep your data private, it will also ensure that your online identity remains protected. BullGuard Internet Security will also locate and remove all known spyware and adware from your computer, as well as cleaning files, registry keys and cookies.   Get BullGuard’s Internet Security software now.
Filed under: Internet Security

Written by Kirsten Dunlaevy

Kirsten Dunlaevy is a blogger for BullGuard. With a background in advertising and branding she is extremely familiar with the ups and downs of social media and the world of communication. Kirsten is here to educate you on how to navigate all things digital, in a safe and responsible manner. Her other passions are decidedly un-digital, she loves being out on the water and cooking.

More articles by Kirsten Dunlaevy

Leave a Reply




Please enter the code

Please enter the captcha code!

Security code

Ranked #1 by industry experts

BullGuard Internet Security Cup

Internet Security

Free download
We use cookies to ensure that we give you the best experience on our website. By continuing to browse, we are assuming that you have no objection in accepting cookies. You can change your cookie settings at any time.