Malware Captures Credentials Through Keystroke-logging
Key-logging allows malware to capture keystrokes when a user types into a specific application or a specific field on a web page (e.g. password). Cybercriminals use key-logging to capture credentials and personal information to enable account takeover and financial fraud and to gain access to sensitive information. Malware uses various techniques to log keystrokes, including hooking into the keyboard driver and related operating system services.
Organizations should address the threat of key-logging malware on customers' and employees' endpoints as it represents a critical threat that can compromise access to external and internal application and data.