Data Security, Encryption, Malware, Network Security

Researchers spot new keylogger that hides in Windows help file

A new data-stealing trojan has turned up on the systems of one of Radware's customers, according to researchers at the network security firm. Researchers said Tuesday that the malware, dubbed Admin.HLP, is designed to log keystrokes and remotely send passwords, credit card numbers and other private information to an attacker-owned server. The trojan gets its name because it hides from detection inside a Windows help file and then is attached to emails. Once installed on a target's machine, it configures the Windows startup process so the trojan runs each time the computer reboots. It is unclear how widespread the threat is, or which organizations it may be targeting. A request for comment was not immediately returned.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

You can skip this ad in 5 seconds