Home Malware Programs Keyloggers 404 Keylogger

404 Keylogger

Posted: November 25, 2019

Commodity malware continues to be a very threatening concept because it allows any low-level cybercriminals to use a potentially harmful cyber-threat against anyone they can think of. These threats are usually sold on underground hacking forums, but their developers may often try to sell them via legit-looking websites that describe the hacking tool as a legitimate project – a fine example of such a product is the 404 Keylogger. A quick Web search about this threat reveals that it was first advertised on a popular hacking forum, and its author does not sell the source code or a full-time license – instead, they opt to rent out the 404 Keylogger for $30/month, $85/3 months, or $175/6 months. They promise to provide their customers with detailed documentation and instructions, as well as with online support if they need it. They also state that the 404 Keylogger will be updated regularly to avoid anti-virus engines, therefore ensuring that customers will get access to a powerful and undetectable hacking tool. It appears that they are trying to expand their reach by also offering the 404 Keylogger via a public website, which claims that this is a tool meant to help companies make sure that their employees are not doing anything shady on their computers. They also state that the product must not be used with ill-minded intentions – a common disclaimer that can be found in just about any advertisement for commodity malware that tries to look legit.

This Commodity Keylogger is Being Spread Online Already

There is no way to estimate how many people have opted to rent the 404 Keylogger's services, but it is certain that the threat is being spread in the wild already, as anti-virus engines have caught it on several computers in different parts of the world. The purpose of the 404 Keylogger is simple – it keeps an offline log of the user's keystrokes and then sends it to the attacker's Command & Control server. This may reveal login credentials, financial data or even private conversations.

In addition to the keylogger module, the 404 Keylogger appears to pack some other features. It also can:

  • Function as an infostealer that grabs stored credentials from a Web browser, FTP clients and some other popular applications.
  • Work as a monitoring tool that grabs screenshots of the user's screen and transfers them to the control server.
  • Serve the purpose of a downloader that can fetch other executable from a URL address, download and launch them.

Usually, commodity malware like this one is not that well-made, and the fact that it is being used by dozens of people means that anti-virus engines will be able to detect it quickly. To ensure that you will not be troubled by the 404 Keylogger, you should use a reliable anti-virus product to secure your computer.

Related Posts

Loading...