helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

158
active users

#Keylogger

0 posts0 participants0 posts today
not Evander Sinque<p>Es gibt nichts zu sehen, bitte gehen Sie weiter. <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Dissent Doe :cupofcoffee:<p>Today's reminder of the insider threat involves a pharmacist in Maryland who over a period of 8 years or more, used keyloggers and installed spyware on about 400 computers at the University of Maryland Medical System so he could spy on female co-workers in private moments at work (such as changing clothes, breastfeeding their babies), and in their homes. He was reportedly fired in October 2024, and was able to get another job in another healthcare facility in Maryland because there has been no criminal charges filed against him yet and UMMS apparently didn't alert his new employer. </p><p>If Maryland law is like my state's laws, the hospital may be barred legally from revealing what happened if asked for a recommendation by the new employer. And it seems the Maryland state pharmacy board can't just suspend a license unless there's been a conviction, so the failure to have criminal charges filed already seems to have put more potential victims at risk. </p><p>Unsurprisingly, a potential class action lawsuit has already been filed against UMMS with six plaintiffs so far. There are estimates that there are more than 80 victims of the now-former employee. </p><p>Some of the media coverage on the case: <a href="https://thedailyrecord.com/2025/04/04/six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedailyrecord.com/2025/04/04/</span><span class="invisible">six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/</span></a></p><p><a href="https://infosec.exchange/tags/InsiderThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InsiderThreat</span></a> <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://infosec.exchange/tags/workplace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>workplace</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Brad<p>Social media post I wrote about <a href="https://infosec.exchange/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemcosRAT</span></a> for my employer at <a href="https://www.linkedin.com/posts/unit42_remcos-rat-keylogger-activity-7304958245322768385-tu-a/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_remc</span><span class="invisible">os-rat-keylogger-activity-7304958245322768385-tu-a/</span></a> and <a href="https://x.com/malware_traffic/status/1899207006939947440" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/malware_traffic/status/1</span><span class="invisible">899207006939947440</span></a></p><p>2025-03-10 (Monday): <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Remcos</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> activity. Email distribution used a zip archive attachment with a .7z file extension. During a test infection, we saw indicators of a <a href="https://infosec.exchange/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> and a Hacking tool to view browser passwords.</p><p>More info at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> of the infection traffic and the associated <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> files are available at <a href="https://malware-traffic-analysis.net/2025/03/10/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/03/10/index.html</span></a></p>
Linux Is Awesome<p>⚠️ Pidgin users warned of ss-otr plugin containing a keylogger, shares screenshots. Immediate uninstall is advised. ⚠️</p><p>Source: <a href="https://pidgin.im/posts/2024-08-malicious-plugin/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pidgin.im/posts/2024-08-malici</span><span class="invisible">ous-plugin/</span></a></p><p><a href="https://mastodon.social/tags/Pidgin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pidgin</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a></p>
9x0rg<p>So vous utilisez Pidgin/XMPP avec le plugin `oss-otr`, ce dernier contient un keylogger.</p><p>À désinstaller immédiatement.<br> <a href="https://pidgin.im/posts/2024-08-malicious-plugin/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pidgin.im/posts/2024-08-malici</span><span class="invisible">ous-plugin/</span></a></p><p><a href="https://mamot.fr/tags/XMPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMPP</span></a> <a href="https://mamot.fr/tags/Pidgin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pidgin</span></a> <a href="https://mamot.fr/tags/KeyLogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyLogger</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://awscommunity.social/@Quinnypig" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Quinnypig</span></a></span> the sheer fact that <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> and <a href="https://infosec.space/tags/Windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows11</span></a> ain't banned across the <a href="https://infosec.space/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a> to this day is an indictment to the <a href="https://infosec.space/tags/TechIlliteracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliteracy</span></a> of politicans in the <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EUCommission</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://respublicae.eu/@europarl_en" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>europarl_en</span></a></span> despite</p><ul><li><a href="https://infosec.space/tags/PRISM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PRISM</span></a></li><li><a href="https://infosec.space/tags/GoldenKeyBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoldenKeyBoot</span></a> (aka. <a href="https://infosec.space/tags/CensorBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CensorBoot</span></a> got owned!)</li><li><a href="https://infosec.space/tags/CryptoAPI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoAPI</span></a> <a href="https://infosec.space/tags/backdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoors</span></a> <a href="https://github.com/kkarhan/windows-ca-backdoor-fix" rel="nofollow noopener noreferrer" target="_blank">they refuse to acknowledge or fix at all</a>!</li><li><a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudAct</span></a></li><li>Unwillingness to comply with <a href="https://infosec.space/tags/GDPR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GDPR</span></a> out if the box</li></ul><p>and now</p><ul><li><a href="https://infosec.space/tags/Recall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Recall</span></a> aka. the worst disguised <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Govware</span></a> / <a href="https://infosec.space/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> in existance that allows anyone to <a href="https://github.com/xaitax/TotalRecall" rel="nofollow noopener noreferrer" target="_blank">simply extract credentials</a> without the need to install a <a href="https://infosec.space/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a>, <a href="https://infosec.space/tags/ScreenRecorder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ScreenRecorder</span></a> and/or commit <a href="https://infosec.space/tags/ProvilegueEscalatiom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProvilegueEscalatiom</span></a> successfully <em>at all</em>...</li></ul><p>And since <span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> managed to get it running on a system w/o <em>"<a href="https://infosec.space/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>" acceleration</em> aka. <em>"<a href="https://infosec.space/tags/NPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NPU</span></a>"</em> it's safe to assume that it'll be perfectly possible to retroactively shove it down everyones' throats without recourse!</p><ul><li>Actually there are options for recourse besides <em>"<a href="https://infosec.space/tags/ThoughtsAndPrayers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThoughtsAndPrayers</span></a>"</em> that regulators like <span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bsi</span></a></span> would actually take this seriously: </li></ul><p>Like: <em>Stop using <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> and <a href="https://www.youtube.com/watch?v=PkKfV0ATrH4" rel="nofollow noopener noreferrer" target="_blank">get some help</a> migrating away from it to a good <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> distro!</em></p><p><a href="https://infosec.space/tags/WhatYouAllowIsWhatWillContinue" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatYouAllowIsWhatWillContinue</span></a></p>
piofthings<p>I am beginning to suspect, Microsoft sends every keystroke in Windows 11 to Bing, and if you block telemetry and block bing at a network level Windows just acts broken. Today I was unable to login to a new wifi because the password textbox would not accept any keystrokes. This is only an extrapolation of past issues where it would type one character twice when using search in the “New Control Panel”. Well since Windows is broken, time to replace it! <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
heavyboots<p>Just to be sure everyone knows this and yet ANOTHER reason to not install these apps on your phone. The built-in browsers in the TikTok, Instagram, FB etc apps log your keystrokes (and therefore your passwords) if you visit a site from the in-app browser. </p><p><a href="https://www.abc.net.au/news/2022-08-22/tiktok-in-app-browser-can-monitor-keystrokes-researcher-finds/101356198" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">abc.net.au/news/2022-08-22/tik</span><span class="invisible">tok-in-app-browser-can-monitor-keystrokes-researcher-finds/101356198</span></a></p><p><a href="https://mastodon.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://mastodon.social/tags/tiktok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiktok</span></a> <a href="https://mastodon.social/tags/instagram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>instagram</span></a> <a href="https://mastodon.social/tags/facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>facebook</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Marcel Waldvogel<p>Eine weiter mögliche Gegenmassnahme könnte vielleicht sein, Verbindungen zu den <a href="https://waldvogel.family/tags/FindMy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMy</span></a>-Servern ab gewissen <a href="https://waldvogel.family/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> Access Points zu unterbinden. Hat da jemand eine Ahnung, ob das funktioniert?</p><p><a href="https://waldvogel.family/tags/WLAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WLAN</span></a> <a href="https://waldvogel.family/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> <a href="https://waldvogel.family/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <br><a href="https://www.heise.de/news/Keylogger-Tastatur-schleust-Daten-ueber-Apples-Wo-ist-Ortungsnetz-aus-9342791.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Keylogger-Tastat</span><span class="invisible">ur-schleust-Daten-ueber-Apples-Wo-ist-Ortungsnetz-aus-9342791.html</span></a></p>
Marcel Waldvogel<p>Apples <a href="https://waldvogel.family/tags/FindMy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMy</span></a>-Netzwerk ist unheimlich praktisch. Leider auch für <a href="https://waldvogel.family/tags/Stalker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stalker</span></a> (Positionsverfolgung) und <a href="https://waldvogel.family/tags/KeyLogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyLogger</span></a> (Weltneuheit: Datenübermittlung!).</p><p>(Da war ich mit meiner vor ein paar Tagen geäusserten Idee, dass man "Find My" auch für anonymen Chat benutzen könne, gar nicht so abwegig. Leider.)<br><a href="https://waldvogel.family/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://waldvogel.family/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <br><a href="https://www.heise.de/news/Keylogger-Tastatur-schleust-Daten-ueber-Apples-Wo-ist-Ortungsnetz-aus-9342791.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Keylogger-Tastat</span><span class="invisible">ur-schleust-Daten-ueber-Apples-Wo-ist-Ortungsnetz-aus-9342791.html</span></a></p>
Mike Kuketz 🛡<p>Tipp Nr.12: Sei vorsichtig beim Umgang mit öffentlichen Terminals oder Computern. Vermeide die Eingabe von sensiblen Informationen, da diese möglicherweise von Malware oder Keyloggern erfasst werden könnten. Mit eigenem Gerät: Von unterwegs bzw. einem fremden WiFi ist es empfehlenswert, eine VPN-Verbindung nach Hause bzw. einem vertrauenswürdigen Netz/Anbieter aufzubauen.</p><p><a href="https://social.tchncs.de/tags/secprivacy2023" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secprivacy2023</span></a> <a href="https://social.tchncs.de/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.tchncs.de/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://social.tchncs.de/tags/schadsoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>schadsoftware</span></a> <a href="https://social.tchncs.de/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a></p>
CK's Technology News<p><a href="https://mastodon.social/tags/Realtek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Realtek</span></a> <a href="https://mastodon.social/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> <a href="https://mastodon.social/tags/Firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firmware</span></a> and a Fully 8051-based <a href="https://mastodon.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a></p><p><a href="https://8051enthusiast.github.io/2021/07/05/002-wifi_fun.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">8051enthusiast.github.io/2021/</span><span class="invisible">07/05/002-wifi_fun.html</span></a></p>
Karl Voit :emacs: :orgmode:<p>Orga­ni­za­tions that create soft­ware assets will have to forbid the use of <a href="https://graz.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> <a href="https://graz.social/tags/Copilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Copilot</span></a> and other AI-assisted tools, lest they unwit­tingly cont­a­m­i­nate those soft­ware assets with <a href="https://graz.social/tags/license" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>license</span></a> viola­tions and intel­lec­tual-prop­erty infringe­ments <a href="https://matthewbutterick.com/chron/this-copilot-is-stupid-and-wants-to-kill-me.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">matthewbutterick.com/chron/thi</span><span class="invisible">s-copilot-is-stupid-and-wants-to-kill-me.html</span></a> <a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://graz.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://graz.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a></p>