{"id":612,"date":"2015-06-02T04:21:03","date_gmt":"2015-06-02T04:21:03","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=612"},"modified":"2024-11-07T15:29:51","modified_gmt":"2024-11-07T09:59:51","slug":"rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/","title":{"rendered":"Rootkits or Keyloggers can Hide on a Graphics Card and Gain Access to your Computer"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>What is a Graphics Card<br \/>\n<\/strong><br \/>\nAny videos, images or pictures that you see on your computer screen are managed by certain graphic components. Such graphic components are aligned in a different card, which is plugged into a specific provision on the motherboard. Hence graphic components are otherwise termed as graphics card. In some cases the motherboard is built up directly with the graphic card on it.<\/p>\n<p style=\"text-align: justify;\"><strong>Graphic Cards &#8211; a source for hackers<\/strong><\/p>\n<p style=\"text-align: justify;\">Hackers and Malware authors have found a way to attack Windows computers by exploiting the Graphics card. This has been a new form of threat, as most of the <strong>antivirus software<\/strong> only perform a scan to check for the presence of malware only in the memory locations and hard drives. They primarily do not scan the Graphics Card&#8217;s Processor Unit (GPU). Knowing this, the hackers are finding such ways of attacking the computers, keeping the Graphic Card as the primary source of exploit.<\/p>\n<p style=\"text-align: justify;\">Attacking the computers through CPU has been considered as one of the traditional means of hacking. Stepping one step in advance, hackers and malicious frauds have built on their hacking attention towards the Graphic Cards. Graphic Card Processing Unit has been developed to conduct complex operations. A user can totally rely on Graphic card for Bitcoin mining or to crack a password. With so much reliability on GPU, hackers try to exploit the complex encryption algorithms through such Graphic cards.<\/p>\n<p style=\"text-align: justify;\"><strong>Demon Keylogger &#8211; The GPU Based Malware<\/strong><\/p>\n<p style=\"text-align: justify;\">Some developers have unveiled the proof of concept code of the GPU based Malware &#8211; the Demon keylogger, revealing the demonstration of how the GPU-based malware captures the keystrokes and saves them in the GPU memory. These keystroke can be followed by the <strong>keylogger malware<\/strong> to steal passwords, login credentials, financial information and personal communications without being detected by the <strong>keylogger detector software<\/strong> or any <a href=\"https:\/\/antivirus.comodo.com\/\">antivirus<\/a> program.<\/p>\n<p style=\"text-align: justify;\"><strong>Jellyfish &#8211; An Educational Based Rootkit<\/strong><\/p>\n<p style=\"text-align: justify;\">A rootkit by the name Jellyfish was released by the developers for educational purposes. The jellyfish rootkit goes undetectable by any of the antivirus programs. Jellyfish rootkit has the tendency to run on CPU host memory through DMA (Direct Memory Access). This innovative feature does not require to go through the CPU to permit the hardware components to read the main system memory, hence making such operations much difficult to detect by any of the traditional antivirus programs. To add to it the vulnerable GPU memory even after shutting down the system.<\/p>\n<p style=\"text-align: justify;\">The security experts have found that the Jellyfish rootkit that was generated only for educational purposes, have all the chances of the Rootkit code to get exploited for illegal purposes.<\/p>\n<p style=\"text-align: justify;\">With the auto-sandboxing technology,<strong>\u00a0Comodo Antivirus<\/strong>\u00a0assist the users in virus removal and <a href=\"https:\/\/enterprise.comodo.com\/blog\/what-is-virus-removal\/\" target=\"_blank\" rel=\"noopener\">virus protection<\/a>.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\">Ryuk Ransomware Antivirus<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p style=\"text-align: justify;\"><img class=\"aligncenter size-full wp-image-1726\" \/><\/p>\n<hr noshade=\"noshade\" \/>\n<p><strong>Bring in the Best Web Security<\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/?af=9356\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3247 size-full\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/12\/comodo-website-security-software.gif\" alt=\"Free Web Security Software\" width=\"650\" height=\"90\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\" rel=\"noopener\">https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/<\/a><\/strong><\/p>\n<ul><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener noreferrer\" target=\"_blank\">Website Backup<\/a><\/strong><\/ul>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/equipment-tracking-software.php\" rel=\"noopener\" target=\"_blank\">Equipment Tracking Software<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a Graphics Card Any videos, images or pictures that you see on your computer screen are managed by certain graphic components. Such graphic components are aligned in a different card, which is plugged into a specific provision on the motherboard. Hence graphic components are otherwise termed as graphics card. In some cases the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[61],"class_list":["post-612","post","type-post","status-publish","format-standard","hentry","category-computer-safety","tag-keylogger"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keylogger hides on a Graphics Card to gain access to your computer<\/title>\n<meta name=\"description\" content=\"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keylogger hides on a Graphics Card to gain access to your computer\" \/>\n<meta property=\"og:description\" content=\"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-02T04:21:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T09:59:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/\",\"name\":\"Keylogger hides on a Graphics Card to gain access to your computer\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\",\"datePublished\":\"2015-06-02T04:21:03+00:00\",\"dateModified\":\"2024-11-07T09:59:51+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\",\"width\":647,\"height\":250,\"caption\":\"Comodo Free Antivirus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rootkits or Keyloggers can Hide on a Graphics Card and Gain Access to your Computer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keylogger hides on a Graphics Card to gain access to your computer","description":"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"Keylogger hides on a Graphics Card to gain access to your computer","og_description":"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2015-06-02T04:21:03+00:00","article_modified_time":"2024-11-07T09:59:51+00:00","og_image":[{"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png","type":"","width":"","height":""}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/","name":"Keylogger hides on a Graphics Card to gain access to your computer","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png","datePublished":"2015-06-02T04:21:03+00:00","dateModified":"2024-11-07T09:59:51+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Now Keyloggers can hide on a Graphics Card and gain access to your computer. Antivirus helps the users to protect the computers from Rootkits \/ Keyloggers.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png","width":647,"height":250,"caption":"Comodo Free Antivirus"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/rootkits-or-keyloggers-can-hide-on-a-graphics-card-and-gain-access-to-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Rootkits or Keyloggers can Hide on a Graphics Card and Gain Access to your Computer"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=612"}],"version-history":[{"count":41,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/612\/revisions"}],"predecessor-version":[{"id":17961,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/612\/revisions\/17961"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}