Full article at: news.com
Cyberthieves silently copy keystrokes
By Tom Zeller Jr.
The New York Times
Published: February 27, 2006, 7:13 AM PST
Most people who use e-mail now know enough to be on guard against "phishing" messages that pretend to be from a legitimate business but are actually attempts to steal passwords and other personal data. But there is evidence that among global cybercriminals, phishing may already be passe.
In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con--the use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks. These programs are often hidden inside other software and then infect the machine, putting them in the category of malicious programs known as Trojan horses..."These Trojans are very selective,"..."They monitor the Web access the victims make, and start recording information only when the user enters the sites of interest to the fraudster."..."It's the wave of the future,"...