Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Suspect a keylogger and/or remote monitoring software on computer

  • Please log in to reply
1 reply to this topic

#1 alphamarcaphi


  • Members
  • 18 posts
  • Local time:07:27 AM

Posted 13 January 2017 - 02:34 PM

Hi all, very good hunch my wife installed a keylogger and/or remote monitoring software on my computer(s).

What would be the best way to discover these? I installed one on my computer and downloaded malwarebytes rootkit, and spyhunter. Malware missed it, spyhunter got it (requires subscription). Not to say I downloaded the same keylogger as she installed.

What is my best option here to solve this? Re-install windows on 3 computers, third party software? Anything? Help?!

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,954 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:27 AM

Posted 13 January 2017 - 03:56 PM

Not all keyloggers are malicious. Many keylogging, surveillance and monitoring programs can have legitimate uses in contexts where an authorized user, business IT tech or administrator has knowingly installed them. Even a parent may use a keylogging program to record their children's online activities or a suspicious spouse might install one to keep track of their partner. It's the misuse of a keylogger (and similar software tools) that makes it's action malicious rather than the keylogger itself. Thus, security scanners may not detect all types of keylogging programs.

Since keylogging, surveillance and monitoring programs can have legitimate as well as malicious uses, there can be potential legal ramifications when assisting someone with installing or removing these types of programs. Even a recommendation could be construed as a gray area some attorneys would not hesitate to explore in order to seek successful litigation. As such, most security forums will hesitate to get involved especially if the situation involves an employee/employer or domestic partner/marital dispute. My response is not intended to imply that any specific situation invokes legal concerns, but merely that it is impossible for us to make the determination as to the computer's ownership and who has what authority in any given situation.

If this is your computer and you believe the person who put the keylogger on the computer did so without legal authority, you should contact an attorney, your local law enforcement, and/or a qualified computer forensics specialist for program removal.

If you do not own the computer, it is best to speak with and ask the owner. If the computer is yours, you should speak with the person you suspect may have installed the program. In either case, a simple "Google search" for how to remove a program should yield the information you seek without jeopardizing another member of an Internet community help site. If you suspect a spouse or ex-spouse/partner and there is a history of abuse or violence, then you should contact local law enforcement authorities. Many police departments have a cyber crime unit which are staffed with experts who can examine your computer.

When legitimate keylogging programs are detected by anti-virus or anti-malware scanners, they are typically identifid as a "risk Tool" or "suspicious" due to its functionality, behavior and potential misuse by others. Anti-virus scanners cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert you, automatically remove them or in some cases may just ignore them, again due to the possibility of legal issues resulting from detecting a legitimate program.

Thank you for understanding.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users