Endpoint Security HawkEye Malware Changes Keylogging Technique August 13, 2019 by arpit Cyberbit Labs have observed HawkEye malware variants changed their keylogging technique. Until now, the most pervasive keylogger malware technique was to register a procedure into the message hook chain of a window using SetWindowsHookExA API. The new variants exploit RegisterRawInputDevices API to register for input from the keyboard. This technique is not a new one. […] Read more » Hawkeye Keylogging Malware
Endpoint Security Hawkeye Malware Analysis May 19, 2019 by arpit What is Hawkeye Malware? Hawkeye malware is a credential-stealing malware that is sold as a software-as-a-service. It uses keylogging to target the endpoint and a free tool, contained in an encrypted resource section of the binary to extract sensitive login data from web browsers. Hawkeye is a file-less attack that can often evade signature-based detection […] Read more » Hawkeye Malware