A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them
read more
Citations
Spyware detection technique based on reinforcement learning
Dataset Construction and Analysis of Screenshot Malware
Single Sign-On Using Contactless Smart Cards and Fingerprint Authentication
E-Banking Security: Threats, Challenges, Solutions, and Trends
References
Optical character recognition system
Optical Character Recognition Systems
From keyloggers to touchloggers: Take the rough with the smooth
Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment
Text line extraction from handwritten document pages using spiral run length smearing algorithm
Related Papers (5)
Frequently Asked Questions (14)
Q2. What is the main purpose of a hacker attacking a banking system?
The main objective of any hacker attacking a banking information system is to steal confidential information such as authentication information.
Q3. What is the trend of using hybrid systems?
• Hybrid approach : to improve recognition performances, the trend is to build hybrid systems [23] that use different types of features, and that combine several layered classifiers.
Q4. What is the way to avoid the use of OCRs on the victim machine?
To avoid the use of OCRs on the victim machine, and thus reduce the use of resources to minimise the risk of being detected, some screenloggers directly transmit screenshots to the hacker’s server without processing them locally.
Q5. What is the definition of a statistical approach?
• Statistical approaches : in the statistical approaches [25], the recognition consists in finding the class to which the character has the highest probability to belong to, and assessing the risk involved in making such a decision.
Q6. What is the way to prevent transmission of malware?
Countermeasures to prevent transmission via storage devices: an effective practice, especially for professional business users, is to never use a removable storage media on their devices.
Q7. What is the countermeasure against screenshots?
Countermeasures against screenshots recordings : if a screenlogger is installed on a device without being detected and is capable of taking screenshots, there is no way to prevent it from working and taking pictures without the risk of altering the execution of other legitimate applications.
Q8. What is the way to detect hardware keyloggers?
The only way to detect hardware keyloggers is to become familiar with these devices or to check the device internally and externally [10] regularly.
Q9. What is the way to prevent the transmission of data to the hacker?
Transmission to the hacker’s machine : once the screenshots (or extracted data) are stored on the victim system they can be transmitted to the hacker in two forms: raw images or data extracted after treatment using an Optical Character Recognition (OCR).
Q10. What is the way to prevent a keylogger from being detected?
• Countermeasures against data transmission : a very close examination of the network usage might reveal the presence of a keylogger.
Q11. What is the main step of the screenloggers process?
This paper has presented the main steps of the screenloggers process, from capturing screenshots to the extraction of relevant information by insisting on the operating mode of the different types of OCRs.
Q12. What is the definition of a support vector machine?
Support vector machines (SVM): these algorithms are supervised learning binary classifiers, designed to solve prediction problems.
Q13. What is the way to prevent the transmission of malware?
Countermeasures to prevent manual installation : to avoid any manual transfer of the malware, the user should take awareness in consideration as a measure, to ensure and protect the system from any possible access (especially the administrator mode).
Q14. What is the second way to achieve this?
The second way would be to use different fonts such that the distance between the captured character and the model would be significant even if it is the same character.