Hackers target unsecured Wi-Fi at hotels and prompt users to download the software.
In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the attacker.Īn infamous keylogger attack uses a type of malware called DarkHotel. While there are legitimate and legal uses for keyloggers, many uses for keyloggers are malicious. Keyloggers, or keystroke loggers, are tools that record what a person types on a device.