Translations:What is:Creepware/5/en

From Information Security Terms
Revision as of 07:32, 2 March 2020 by FuzzyBot (talk | contribs) (Importing a new version from external source)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

In addition, creepware allows the attacker to remotely monitor the compromised device, namely:

  • keep a log of keystrokes pressed;
  • take screenshots of the screen;
  • record video from the connected webcam;
  • record audio from the connected microphone;
  • steal passwords;
  • download and upload files from/to the device;
  • open web pages;
  • display messages on the screen;
  • play audio messages;
  • reboot or turn off the compromised device.