Supported cryptocurrencies:
BTC BTC
BCH Bitcoin Cash
NANO NANO
XTZ Tezos
0.4 XTZ
EnglishWhat are the best security practices to secure windows folders access once someone has a keylogger on your system?

Recently I've seen lot's of attacks happening where a malicious user is sending an executable file usually by an email and then installs a keylogger on the pc, stealing email and passwords + copies user data.... Any safety measures that could help to reduce / restrict access once the executable file has been activated?

PANAGOT 4 months ago
    Tags:
  • Hack
  • Attack
  • Social Engineering
question_image


Please Sign-in to post a comment.
eminent23 4 months ago
immediately you notice this. Disconnect your PC from the internet. secondly Install a good antivirus and scan the pc.
Joseph Ibrahim ladan 4 months ago
https://www.google.com/url?sa=t&source=web&rct=j&url=https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/&ved=2ahUKEwiizcvNqJPxAhWID2MBHdztCmQQFjAAegQIAxAC&usg=AOvVaw04VF-IPAdeSaK1dKxvsvVt
nyansa 4 months ago
visit this website for 5 ways to protect yourself against the keyloggers, the most efficient on this page is the using of firewalls, I even use one
https://www.makeuseof.com/tag/4-ways-protect-keyloggers/
Teddy 4 months ago
Check out this site: https://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
mmd_2050 4 months ago
Make sure your windows defender is update and you also perform a full malware scan to detect key logger. However, you can also detect and remove key logger from your task manager too.
Ankator 4 months ago
AdwCleaner...
Jakub 4 months ago
If you encrypt files and folders in Windows, your data will become unreadable to unauthorized parties. Only someone with the correct password, or decryption key, can make the data readable again.
fered dered 4 months ago
https://ip-calculator.ru/blog/ask/chto-takoe-kejlogger/
Soroush Mansouri 4 months ago
Use Virtual Keyboards
NP 4 months ago
Us the windows on screen keyboard OSK in settings and backup all files to another machine so keylogger can’t send back what you do. Then when you have saved your important files use a good quality antivirus protection.
theo 4 months ago
Below are 10 simple steps, in no particular order, against keylogger attacks:
1. Use a Firewall
2. Install a Password Manager
3. Update Your System
4. Consider Additional Security Tools
5. Change Your Passwords
6 Remove Your Keylogger…
7 Avoid phishing scams
8 Use on-screen keyboard
9 Enter passwords in chunks if required
10 Anti-virus software
These Techniques/methods will help protect against keyloggers by decreasing their opportunity to infect your PC with malware. Furthermore, you're taking steps to isolate the amount of data a keylogger can access in the event you happen to get one.
CIURLO 4 months ago
Use best antivirus and scan all files
Hugo 4 months ago
first you should delete de keylogger. So go to task admin (right click on windows bar and task administrator) and search for the keylogger proccess, right clock on it and go to its location. After that, delete the file (it must be a .exe). If you want to protect folders, maybe you just want to cypher them, but this is an advanced proccess, If you want to know how, just reply this comment.
Marcus David Potter 4 months ago
Firstly disconnect your machine from the internet, and by that I mean physically. You need to be 100% sure that the keylogger cannot phone home. Then once you've done that, make an image of the computer's drive(s), particularly the drive on which Windows is installed. However I'd recommend doing them all to be on the safe side. Additionally, backup all of your data, to an offline destination. Then reformat your Windows partition (the one with the Windows folder on it), and reinstall Windows from scratch. Then restore your data, and keep the image backups so you can access them (if possible) or failing that in the event that you loose your data backups or snooker yourself. Then you can start from square one again.
SixCode 4 months ago
You should download AxCrypt and then press the button give safety to them and choose the files you want to protect.Keyloggers can not encrypt files by themselves.
Jevaughn Walcott 4 months ago
Encryption of your files will definatly help secure your account
omid 4 months ago
1 - disconnect pc from internet
2 - install kaspersky internet security and scan pc
3- right click on folder and open properties
4- click advanced and check "Encrypt contents to secure data"
Leon 3 months ago
my opinion is format your window OS, it will clean up everything include the keylogger and backup your important data before formating your window OS
hunter 3 months ago
I would suggest installing an anti-virus immediately. Disconnect your PC from the internet ASAP, and even then a hard reset could still have to take place.
Nauman 3 months ago
immediately
Bebbo 3 months ago
norton antivurus
memz buck 3 months ago
Run Malwarebytes, scan system and quarantine threats. By far this is the most effective yet easiest method of removing unwanted programs.
yusufkacmaz72 3 months ago
2. Bir Parola Yöneticisi Kurun
Sabit bir güvenlik tavsiyesi, şifrelerinizi güncellemeniz ve değiştirmenizdir (başlangıçta güçlü bir tek kullanımlık şifre kullanmakla birlikte). Ancak, kabul edelim: Çoğumuzun kullandığı şaşırtıcı sayıda site için onlarca 16 karakterlik şifreyi hatırlamak gerçekten zor. Keylogger'lar basitliklerinde etkilidir; tuş vuruşlarını kopyalar ve bilgileri günlüğe kaydeder. Peki ya gerçekten bir parola yazmadıysanız?

Çoğu parola yöneticisi, belirli bir hesabın kilidini açan bir ana parola sağlamak için otomatik doldurma işlevini kullanır. Parolanız hala çalışıyor, zaten Twitter beslemenize göz atıyorsunuz ve hepsini yazmadan. Kulağa harika geliyor, değil mi?

Ne yazık ki, bir şifre yöneticisi birkaç nedenden dolayı sizi ancak bir yere kadar götürebilir.

Bazı şifre yöneticileri şifrenizi kopyalayıp yapıştırmaz. Bunun yerine, parolayı girmek için bir otomatik yazma işlevi kullanırlar. Değerine değer herhangi bir keylogger, sanal tuş vuruşlarını da kopyalayacaktır. Fakat…
…Yeterince iyi tasarlanmış bir keylogger, panonun içeriğini kaydetmenin yanı sıra periyodik olarak ekran görüntüleri de alacaktır.
Bazı tehlikeli gelişmiş kötü amaçlı yazılım türevleri, çevrimdışı parola veritabanlarını hedef alarak tek seferde bir liste yerine tüm listeyi çalacaktır.
Şimdi, her şey kaybolmadı. Örneğin, KeePass, İki Kanallı Otomatik Tip Gizleme (TCATO) kullanarak birinci ve ikinci sorunu reddeder. TCATO temel olarak parolayı iki alt parçaya böler, ikisini de panoya gönderir ve ardından parola alanında birleştirir. Ancak, kabullerine göre, TCATO %100 güvenli değildir ve "gizlenmiş otomatik türü günlüğe kaydetme konusunda uzmanlaşmış özel bir casus uygulaması yazmanın teorik olarak mümkün olduğunu " belirtir.

Bir parola yöneticisinin amacı, keylogging'i durdurmak değildi. Ancak, bir keylogger ile karşılaşırsanız ve yüklü bir parola yöneticiniz varsa, sahip olduğunuz her hesap için her parola yerine yalnızca bir hesabın güçlü tek kullanımlık parolasını kaybetme şansınız vardır. Başlamak için beş şifre yöneticisi hizmetinin bu karşılaştırmasına göz atın .


3. Sisteminizi Güncelleyin (Ve Bu Şekilde Tutun)
Being proactive about system security is always a good idea. One of the most important parts of a proactive defense is keeping your system up to date. That includes your operating system as well as the applications and programs you run on it. Keyloggers and other malware look for exploits in outdated software and can take advantage of them, sometimes without you knowing anything is wrong.

Security researchers find new exploits all of the time. Some are relatively benign. Others are patched immediately by the developer. But others still become critical exploits used to expose your computer to malware.

Particularly rare and unreleased vulnerabilities are known as zero-day exploits and carry a significant threat. Indeed, the CIA ran into trouble when it emerged hackers had liberated their previously unknown and top secret zero-day vulnerability stockpile, releasing powerful exploits into the wild---leading directly to the enormous WannaCry ransomworm.

Updating software isn't always convenient, but it could save you and your system from serious trouble down the line.

4. Consider Additional Security Tools
The default security options for Windows 10 and macOS are okay, but you should always consider bulking that security out for maximum protection. Check out our list of the best security and antivirus tools for your system. These are Windows-focused, but many have macOS equivalents and are worth the small investment.

If you want security tools that specifically target keyloggers, check these two free options out:

Ghostpress: a free anti-keylogger with an extremely small performance footprint. Features Process Protection to stop any other program terminating Ghostpress.
KL-Detector: a basic keylogger detection tool. Once you detect a keylogger, it's up to you to remove it, but the tool will alert you to the keyloggers presence.
Another worthwhile investment is Malwarebytes Premium. Unlike the free version, Malwarebytes Premium constantly monitors your system for potential threats. This alone drastically cuts your chances of picking up something nasty.

5. Change Your Passwords
If you suspect something is wrong, use a different computer to change your passwords. The measures listed above should provide ample protection against keyloggers, but there always seems to be people who have their passwords stolen even though they did everything right.

Frequently changing your passwords will help minimize the potential damage of a keylogging attack. Your password may be stolen, but it would be uncommon for it to be stolen and used immediately unless that keylogger was targeted directly at you (in which case you may have bigger problems than keylogging!). If you change your password every two weeks, your stolen information will no longer be useful.

Remove Your Keylogger…
These methods will help protect against keyloggers by decreasing their opportunity to infect your PC with malware. Furthermore, you're taking steps to isolate the amount of data a keylogger can access in the event you happen to pick one up. And, although you can never have 100% protection, you can certainly empower yourself and your system in the battle against malware.


SHARE

TWEET
EMAIL
Kendin Yap-Gadget'ları-Arkadaşlarınıza-Sürpriz Yapmak İçin
10 Mind-Blowing DIY Gadgets That’ll Impress Your Friends
From battery chargers to aircon units, here are some cool DIY project ideas you can show off to your friends.

READ NEXT
RELATED TOPICS
SECURITY

KEYLOGGER

COMPUTER SECURITY

MALWARE
ABOUT THE AUTHOR

Gavin Phillips (898 Articles Published)
Gavin, Windows ve Teknoloji Açıklaması için Junior Editör, Gerçekten Faydalı Podcast'e düzenli olarak katkıda bulunan ve düzenli bir ürün incelemecisidir. Devon tepelerinden yağmalanan Dijital Sanat Uygulamaları ile Çağdaş Yazma (Hons) lisans derecesine ve on yılı aşkın profesyonel yazma deneyimine sahiptir. Bol miktarda çay, masa oyunları ve futboldan hoşlanır.

Gavin Phillips'dan Daha Fazla
HABER BÜLTENİMİZE ABONE OL
Teknik ipuçları, incelemeler, ücretsiz e-kitaplar ve özel fırsatlar için bültenimize katılın!

[email protected]
SUNMAK
TELDE
karanlık tema pencereleri
Gözleriniz İçin En İyi Windows 10 Karanlık Temaları
akıllı telefon güncellemeleri
Akıllı Telefonunuzu Güvende Tutmak İçin Güncellemeniz Gereken 6 Şey
bölünmüş hdmi
Bir HDMI Sinyalini Birden Çok Ekrana Nasıl Bölünür
CheatSheet açılış ekranının ekran görüntüsü
CheatSheet Kullanarak Her Mac Klavye Kısayolu Nasıl Bulunur?
sosyal-medya-ikonları-2
Windows 10'da Programlar için Görev Çubuğu Simgeleri Nasıl Değiştirilir
sosyal medya fenomeni
Bu Masterclass Kurs Paketi ile Başarılı Bir Etkileyici Olun
ThunderX 2 months ago
Make Folders hidden/unvisible
Rajesh kumar Deol 1 month ago
I would suggest use deepfreeze. If you suspect a malicious software has been installed. Just restarting the computer will erase anything beyond the point of freezing.
Charles Sobhraj 1 week ago
Yeah, Anti-virus/Anti-malware can help but you don't get to learn anything that way.
I'd suggest you learn things this way.

It is easy for someone to install a malware on your system but tough to keep it running.
There are only a few ways a malware makes itself "persistant"
For it to be persistant, the malware has to ensure that the computer runs it on "Startup"
(Startup = Every time your system is turned on)

So, let us start our quest to find the malware ourselves.


First off, Press Windows Button+R type in taskmgr and hit Enter.
Click on "Startup" tab

This provides a list of softwares that run on startup.
Look for suspicious ones, hackers usually craft their malware to make it look least suspicious.
For Ex: You don't need Chrome to run on startup.

If you see any, right click on them and click "Open File Location" & Delete the file, and disable it from auto-start in the task manager, if you aren't sure what is suspicious, drag that file and upload it on virustotal.com, this site scans the files you upload with multiple anti-viruses.

-

Another way for malwares to run on startup is to copy themselves to the startmenu>startup folder

Like last time, press Windows Button+R & type in shell:startup
Look for suspicious shit, delete it or better yet if you aren't sure what is suspicious, drag that file and upload it on virustotal.com, this site scans the files you upload with multiple anti-viruses.

-

Last place for them to hide is in regedit

Press Windows Button+R type in regedit and hit enter, there's an address bar on top copy paste this - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
and hit enter

A list of apps/softwares that utilise regedit to autorun shows up.

Look for suspicious ones here, their file-locations are shown there, open each file, scan em with virustotal.com and you should know which ones to delete. (Right click on the entry and click Delete)

~

You're good to go.
Make sure you scan every executable file on virustotal.com before running it.

Good day!