Home Malware Programs Keyloggers Phoenix Keylogger

Phoenix Keylogger

Posted: November 20, 2019

The Phoenix Keylogger is spyware that collects information from Windows computers, such as passwords or credit card numbers. The Phoenix Keylogger can accomplish this goal quickly and remove any evidence of the infection after the PC reboots, although it does have an optional, long-term persistence feature. Users should let their anti-malware products block and remove the Phoenix Keylogger appropriately and change security credentials ASAP after the attack.

Birds Burning Briefly Bright with Collected Data

After building his previous experience with the Alpha Keylogger, a threat actor is moving into another crowning centerpiece for his data-exfiltrating business model: the Phoenix Keylogger. This threat is very different from past ones of the same moniker, such as the file-locker Phoenix Ransomware or the drive-by-downloading Phoenix Exploit Kit. Although its purpose is to move data automatically, many of the Phoenix Keylogger's most essential traits have little to do with its spying routine.

The Phoenix Keylogger's operations involve being sold out to other criminals who deploy it with the methods and at the targets they prefer. Summertime estimates of infected Windows systems are well into the thousands. Although the Phoenix Keylogger began as 'only' a keylogger that records and transmits keyboard-typed information, updates provide it with additional data-collecting functionality. It also bears various code-based similarities with the Alpha Keylogger, which provides a hint as to why the latter's development ceased.

What is, however, most intriguing about the Phoenix Keylogger is its aggressive means of countering security and analysis environments. It scans for and terminates memory processes related to both popular security tools and Virtual Machine utilities forcibly. Ordinarily, a Trojan might avoid installing itself on such a system; in the Phoenix Keylogger's case, the author is opting for a more aggressive solution that doesn't relinquish ground on the vulnerable system.

Dimming the Flame of Larceny for Hire

The upgraded versions of the Phoenix Keylogger can collect passwords and other credentials from a healthy variety of Web browsers, e-mail and FTP clients, and social messaging applications. It also holds potentially effective countermeasures against over eighty brands of cyber-security and VM products, which is comprehensive unusually. Any infection strategies that might deploy it are as potentially flexible as the individuals hiring the spyware.

The Phoenix Keylogger also has another, last feature worth highlighting: the optional absence of long-term persistence. Since its system-persistent behavior isn't 'baked in' to the Trojan's default setup, it can collect information, transfer it to a C&C server, and vanish as soon as the computer reboots. Such behavior hinders attempted analysis of its various campaigns and the victims at risk.

Most anti-malware products include defenses against non-consensual termination, and users still should rely on them for removing a Phoenix Keylogger. Any suspected infection should provoke appropriate changes to credentials like passwords and security questions since the leaked information is susceptible to being sold on the black market.

The Phoenix Keylogger isn't a high-effort work in every respect; its internal anti-VM list appears to be copied from another source. However, it puts in the coding expertise where it matters, and it's up to Windows users to maintain their safety and privacy correspondingly.

Related Posts

Loading...