What I found was SO interesting that I went ahead and bought the pro version, which included the screenshots and the capability to deliver the logs and screenshots via email, cloud storage, ftp, or locally. I downloaded the free version, launched it in a lab environment and started searching for logs. Upon visiting the website I was immediately presented with this:
Since I have never really analyzed a keylogger from a log analysis perspective, I was very eager to get my hands on it. The report highlighted that the tool could capture not only keystrokes but screenshots of active sessions. There was a section in the report that mentioned the tools that were being used and within the list was the Revealer Keylogger from Logixoft. It is a lengthy report but very much worth the time I took.
Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT) they dubbed OPERA1ER.