SecureMac, Inc.

Malware Library. Threats targeting Macs.

Mac malware exists in all shapes and sizes and new digital parasites evolve every day. Whether it’s adware, trojan horses, keystroke loggers, viruses or other spyware, stay up-to-date and discover more information about the latest threats targeting your Mac here.

Key Logger Security Threat for Mac OS X

Able

Able

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

Able is a keylogger which runs on macOS 10.5 and later. Like all keystroke loggers, it can be used to monitor the activities of any computer on which it is installed. Able requires administrative permissions for installation and log viewing. Once installed, Able can record all keystrokes entered on the host computer, with the exception of those entered in password fields. The software creates detailed, password-protected log records of all system users which are only accessible to the person who installed the software. In …

Read
AceSpy

AceSpy

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

AceSpy is a keylogger marketed as a parental monitoring tool, but like all keystroke logging software, it can be used to monitor the activities of any computer on which it is installed.

Designed to run undetected on the host computer, AceSpy creates detailed records of the system’s activities and forwards them to an email address controlled by whoever installed the program. In addition to logging keystrokes, AceSpy records web and search activity, email conversations, and social media interactions; it is also able to take screenshots …

Read
Amac

Amac

also known as OSX/AMK.A, OSX/AMK.B, OSX/AMK.C

Type:
Keylogger

Platform:
Mac OS X

Last updated:
03/02/19 12:34 am

Threat Level:
High

Description

Amac is a keylogger marketed as a monitoring tool for employers, parents, and schools. However, like all keystroke logging software, it can be used to record the activity of any computer on which it is installed.

Formerly offered by Amac Software Co., Ltd., and related to the Aobo and EaseMon keyloggers, Amac is designed to run undetected in the background of the Mac on which it is installed, without any telltale icons or folders visible to the user. The software …

Read
AnyKL

AnyKL

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

AnyKL is a keylogger. Like all forms of keystroke logging software, AnyKL can record the activity of all users of the computer on which it is installed.

AnyKL records keystrokes entered on the system as well as information about which application was being used at the time. The Professional Edition of AnyKL also supports password capture. In addition to logging keystrokes, the app takes system screenshots, records user web activity, and tracks program launches and app installations. AnyKL covertly transmits all logs to an email …

Read
Aobo

Aobo

also known as OSX/ABK

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/04/20 9:53 am

Threat Level:
High

Description

Aobo is a keylogger marketed as a child and employee monitoring tool, but like all keystroke logging software, it can be used to monitor the activities of any computer on which it is installed.

Formerly offered by Awosoft Co., Ltd., and related to the Amac and EaseMon keyloggers, Aobo has both Standard and Professional editions. Aobo is designed to run silently in the background on a host computer, and can only be accessed using a special hotkey set up by the person …

Read
Award

Award

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

Award is a keylogger. Like all keyloggers, it can be used to monitor the activity of any system on which it is installed.

Award allows the administrator to monitor keystrokes, clipboard content, and app usage. The keylogger can also take screenshots, either at set intervals or whenever a specific event (like a mouse click) occurs. Data is collected into log files which are then delivered via email to whoever controls the software.

Unlike other, more fully-featured keyloggers and spyware, Award does not permit the monitoring of …

Read
BackTrack

BackTrack

Type:
Keylogger

Platform:
Mac OS X

Last updated:
02/09/16 9:14 pm

Threat Level:
High

Description

BackTrack is a keylogger. It is marketed as a data recovery tool designed to help users in the event of an application crash, but like all keystroke logging software, it can also be used to record the activity of any user working on the computer on which it is installed.

BackTrack captures all keystrokes — with the exception of passwords — and saves them in an SQLite database file along with relevant metadata. In addition to what was typed, the program also records the application …

Read
BPK

BPK

also known as BlazingToolsPerfectKeylogger, PerfectKeyloggerLite

Type:
Keylogger

Platform:
Mac OS X

Last updated:
03/03/20 12:30 am

Threat Level:
High

Description

BPK Keylogger, now called Perfect Keylogger, is a keylogger. It is marketed as a family or employee monitoring tool, but like all keystroke loggers, it can be used to record the activity of any computer on which it is installed.

Once active, BPK Keylogger runs stealthily in the background and records the keystrokes pressed by users of all accounts on the computer. The more expensive “Pro” version of the software supports logging of keystrokes typed into password fields as well. BPK …

Read
eWatch

eWatch

    • Type:
    • Keylogger
    • Platform:
    • Mac OS X
    • Last updated:
    • 02/09/16 9:14 pm
    • Threat Level:
    • High

Description

eWatch is a keylogger that can record screenshots, log keystrokes, and collect internet browsing history, either storing the data locally or sending it to an email address specified by an attacker.

eWatch Threat Removal

MacScan can detect and remove eWatch Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.

Download MacScan

Read
1 2

Join our mailing list for the latest security news and deals