Keylogging software called iSpy has been released in several versions and is constantly tracked by malware researchers because of it’s high level of demand. The software is sold online as a part of a scheme to distribute it as a service, similar to RaaS schemes (ransomware as a service). It aims to log keystrokes live and hence steal Skype and other private messages and records as well as important credentials and passwords. In case you believe you have been infected by this keylogger we advise you read the below-mentioned article.
|Short Description||Collects keystrokes, password data, Skype chat logs and other key-related information and sends it to a malicious C&C(Command and Cotnrol) server.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
|Detection Tool|| See If Your System Has Been Affected by malware |
Malware Removal Tool
|User Experience||Join our forum to Discuss iSpy Keylogger.|
How Does iSpy Infect
The iSpy Keylogger In-Depth
Once this malicious attachment which is essentially the loader of iSpy’s payload is activated on the computer it drops a payload in an obfuscated manner with the following languages used for it’s compression:
- Visual Basic 6.0
In addition to this the payload of iSpy has several modules responsible for different types of keylogging and also other features, like taking screenshots and PIN and password stealer components, just like some Trojans have. One of the features that were added to the latest version of iSpy keylogger aims to record Skype chats and erasing recorded messages. The keylogging software has a combination of other modules to deactivate any security pop-ups during infection.
Furthermore, the iSpy keylogger creates a sub-key with a value string pre-programmed to run a module that disables antivirus software. The targeted key is the following:
→Software \Microsoft\Windows NT \ CurrentVersion \ Image File Execution Options
After this has been done, the iSpy malware runs an executable that may appear identical to the official rundll32.exe file.
To steal data from infected computers, the iSpy keylogger uses the three well-known protocols for data transfer:
To transfer the logged data, iSpy also uses it’s custom created encryption cipher. Then it sends the data to an FTP account which is usually online and belongs to the cyber-criminals. It has the credentials of those accounts it uses in the log files themselves or the malicious files.
The iSpy Keylogger – Conclusion and Removal Instructions
Since iSpy is very powerful and highly concealed from security software, like conventional and well-known antivirus programs, it is very important to be careful what you open online. Usually, most loaders that are obfuscated and spread malware, like the iSpy keylogger have been pre-programmed to be undetected from most well-known antivirus programs during the infection process.
Furthermore, we have prepared the removal instructions below that will assist you to remove iSpy keylogger from your computer. But bear in mind that it may be difficult to manually uninstall this malware from your computer, because of the multiple concealed files and modules.
This is the primary reason why it is advisable to use an advanced anti-keylogging software which offers a non-commercial, discrete and professional protection to protect computers from iSpy keylogger effectively. It is also advisable to use an advanced anti-malware software in combination with this to scan your computer and detect every file and module associated with the virus to remove it.
- Guide 1: How to Remove iSpy from Windows.
- Guide 2: Get rid of iSpy from Mac OS X.
- Guide 3: Remove iSpy from Google Chrome.
- Guide 4: Erase iSpy from Mozilla Firefox.
- Guide 5: Uninstall iSpy from Microsoft Edge.
- Guide 6: Remove iSpy from Safari.
- Guide 7: Eliminate iSpy from Internet Explorer.
How to Remove iSpy from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove iSpy
Step 2: Uninstall iSpy and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by iSpy on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by iSpy there. This can happen by following the steps underneath:
Get rid of iSpy from Mac OS X.
Step 1: Uninstall iSpy and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove iSpy via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove malware from your Mac
When you are facing problems on your Mac as a result of unwanted scripts, programs and malware, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove iSpy from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase iSpy from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall iSpy from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove iSpy from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the iSpy will be removed.
Eliminate iSpy from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.