Blackhat: Installing a Keylogger

A hacker sends a company employee a fraudulent email prompting him to change his password. The employee downloads a PDF, which is a keylogger posing as password security guidelines. Once the keylogger has been downloaded, the hacker gets the employee's credentials and logs into the system.

Public Discussion Questions


  1. Why should we be careful about downloading files from unknown sources?

Please sign in to add a discussion question.

Standards


No standards

Please sign in to add standards to this clip.

Public Pause Prompts


Start Time Prompt Timing Length
00:13 What do you think will happen now that he has downloaded this file? Timed 00:30

Comments


  • Jason Frieling
    5 months ago
    I used this clip for a staff email.
Please sign in to write a comment.

Related Clips


Cybersecurity → Malware → Virus
Cybersecurity → Malware → Spyware
Cybersecurity → Malware → Worm
Law → Financial Fraud → Salami Slicing
Cybersecurity → Phishing → Link Manipulation
Cybersecurity → Social Engineering → Pretexting
Cybersecurity → Phishing → Email
Cybersecurity → Malware → Ransomware