Researchers say that the bug is not too advanced, but unfortunately, it’s highly efficient at stealing your passwords and sending it straight to a cyber criminal’s inbox.

Fauxpersky’s origins

This keylogger was built off AutoHotKey which is a popular app that allows users to write tiny scripts for automating tasks and afterwards compile them into executable files. The app was forced by hackers to build a keylogger which is now spreading its tentacles via USB drives and keeps infecting systems running Windows. It also has the ability to replicate on the system’s listed drives. Researchers who found the issue, Amit Serper and Chris Black, wrote a detailed blog post that got published on Wednesday, March 28 in which they address the exact means through which Fauxpersky works its way into systems.

RELATED: 4 best antivirus solutions for USB flash drives

Fauxpersky’s modus operandi

Researchers also said that even if this malware is not exactly advanced, it still manages to be quite dangerous because it infects USB drives and gets data from the keylogger via Google and sends it to the attacker’s inbox. After the bug’s core file are running, everything that is being typed on a system is recorded into a text file with the window’s name so that the attacker can have a better understanding of the text’s content. The data gets out of the system via a Google Form and heads to the attacker’s inbox, and the file gets deleted from the disk.

Google took the malicious form down

After the researchers have reported the form to Google, the company took it down immediately and did not comment anything on this matter. We don’t know how many systems have been infected, but considering that it spreads via sharing USB drives, it might not have reached that many computers. RELATED STORIES TO CHECK OUT:

Best anti-keylogger software to obliterate keyloggers Here’s the best antivirus with boot scan to remove hidden malware 8 of the best antivirus with USB scanner for 2018

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ