Trojan.Keylogger is Malwarebytes generic detection name for applications that have the capabilities to harvest keystrokes, screenshots, network activity, and more from affected systems. Trojan.Keylogger may covertly monitor user behaviour and harvest personally identifiable information including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity.
Trojan.Keylogger may be capable of the covert collection of screenshots, video recordings, or the ability to activate any connected camera or microphone. Collected information may be stored locally and later retrieved, or may be transmitted to an online service or location.
Trojan.Keylogger may run as a start-up entry and may be visible as running processes on compromised machines. Alternatively, Trojan.Keylogger may also be configured in a manner which prevents visible processes and start-up entries
Trojan.Keylogger may be distributed using various methods. This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, this software may be installed by an individual with physical or remote access to the computer. Trojan.Keylogger may be installed with or without user consent.
Malwarebytes protects users from Trojan.Keylogger by using real-time protection.
Malwarebytes blocks Trojan.Keylogger
Malwarebytes can detect and remove many Trojan.Keylogger infections without further user interaction.
You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.
Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.
On the Quarantine page you can see which threats were quarantined and restore them if necessary.
Select your language