Keylogger spyware ordered off the market

By on

In a victory for privacy advocates, an Orlando, Fla.-based company has been ordered not to sell keylogger spyware.

In a victory for privacy advocates, an Orlando, Fla.-based company has been ordered not to sell keylogger spyware.

The company, Cyberspy Software, LLC, marketed a product called RemoteSpy keylogger spyware to customers, who in turn were enabled to secretly monitor unsuspecting users' computers.

The U.S. District Court court order, sustaining an action brought by the US Federal Trade Commission (FTC), said, “consumers throughout the United States have likely suffered and will likely continue to suffer substantial injury, including monetary loss, as a result of Defendants' unlawful acts or practices.

In addition, Defendants have been unjustly enriched as a result of their unlawful practices.”

The FTC complaint said that Cyberspy Software promoted the program, called RemoteSpy, as a “100 percent undetectable” way to “Spy on Anyone. From Anywhere.”

The FTC complaint also said that the defendants unfairly collected and stored the personal information gathered by their spyware on their own servers and disclosed it to their clients.

According to papers filed with the court, Cyberspy provided its clients with detailed instructions explaining how to disguise the spyware as an innocuous file, such as a photo attached to an email.

When the victims clicked on the disguised file, the keylogger spyware installed itself without the victims' knowledge and recorded every keystroke typed – including passwords.

In addition to halting the sale of RemoteSpy software, Cyberspy was ordered to disconnect any servers that collect, store or provide access to information that its software gathered.

The court also said that it may award other “ancillary relief,” which could include the return of “ill-gotten gains.”

The complaint named Tracer R. Spence – the registered agent and manager of CyberSpy Software – as the person “liable and culpable for the charges made in this case.”

This represents at least a small victory against what some people regard as one of the most nefarious ploys out there. But since keyloggers are the ubiquitous tools of the cybercrime tool inventory, just eliminating a commercially available program may do little to stem the tide.

But it's a start, and some technical progress against the threat is being made. For example, the 64-bit versions of Windows Vista and Server 2008 implement mandatory digital signing of kernel-mode device drivers, which restricts installation of keylogging rootkits.

See original article on
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?