SCN: Keystroke logging
Steve
steve at advocate.net
Wed Dec 5 07:30:40 PST 2001
x-no-archive: yes
======================
(Robert Vamosi, ZDNet AnchorDesk)---What if every keystroke you
typed was recorded? Programs that do this have existed for years,
and are often traded on shadowy Web sites. Alone, they are mere
curiosities, but when coupled with Trojan horses that send the
data over the Internet, these so-called keystroke loggers allow
malicious users to steal your passwords and credit card numbers.
Now the U.S. government wants to use similar keystroke-logging-
enabled Trojan horses in the war against terrorism, and two U.S.
antivirus companies have announced they'll look the other way.
Simply put, a keystroke logging program is a memory application
that records every keystroke a user makes on a given computer.
Most keystroke loggers record the application name, the time and
date the application was opened, and the keystrokes associated
with that application. For example, when you open Outlook and
write an e-mail, the keystroke logger would record your e-mail
address, the subject line, and any body text you type.
Some keystroke loggers are advertised as child-protection
programs, as they allow parents to see which sites their children
have visited, or what their children typed during online chats.
Keystroke loggers are also advertised as a means for companies
to "assess" their employees' work habits. But this technology gets
really pernicious when a malicious user couples it with a Trojan
horse, as was the case with the recent Badtrans.B worm.
Often, keystroke loggers track what you type in popular Web
browsers. Lately, though, new loggers record the passphrase you
enter into encryption programs such as PGP. The passphrase is a
series of words that access your encryption key. Once malicious
users obtain your passphrase, they can use your encryption key,
and therefore decrypt any information you have encrypted.
The U.S. government wants to use these encryption-keystroke
loggers to find criminals and terrorists. In a recent and highly
publicized loan shark and racketeering case in New York, FBI
agents obtained information using an encryption-keystroke logger
placed on computers in suspected mobster Nicodemo Scarfo's
New Jersey office. According to MSNBC, agents did so by
breaking into the Scarfo office and individually installing the logger
on each computer. (I'll leave the question of whether or not the
government should be able to "steal" encryption keys for another
column.)
Code-named "Magic Lantern," the bureau's new project would
essentially create a government-sanctioned Internet worm that
would self-install encryption-keystroke loggers on chosen
computers. Agents would still need to obtain a court order before
"infecting" someone, however the U.S. Patriot Act passed in
October requires authorization only from a state or U.S. attorney
general at first; a judge's order isn't needed until later.
One method of distributing the encryption-keystroke loggers
involves having a friend or relative of the person under
investigation send him or her an infected e-mail. Of course, this
could only happen if the suspect's antivirus program didn't first
detect the FBI's Trojan horse.
So far, Symantec and Network Associates have said their software
will not detect the presence of this FBI Trojan horse. It should be
noted that antivirus products already exclude some files from their
scans, though none are as powerful as Magic Lantern. No
antivirus software vendors outside the U.S have weighed in on this
matter yet.
Shane Coursen, a SecurityFocus columnist and CEO of WildList
Organization International, a group that tracks viruses in the wild,
predicts that any such collusion with the FBI might begin the
downfall of U.S. antivirus software maker's dominance worldwide. I
think the real danger lurks in the FBI borrowing a page from a
malicious user's notebook. Even if every antivirus vendor in the
world agreed to exclude the FBI's Trojan, the shadow Web sites
already used by malicious users would start hosting custom Magic
Lantern detection programs. Once such a tool is available, the
FBI's magic would be useless.
Copyright 2001 CNET Networks Inc.
* * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * *
. To unsubscribe from this list, send a message to:
majordomo at scn.org In the body of the message, type:
unsubscribe scn
==== Messages posted on this list are also available on the web at: ====
* * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * *
More information about the scn
mailing list