This test is specifically done for Indian Environment as it is unique as 50% of the machine are pre infected machines. Though there are awards like Virus Bulletin 100, VB 100 concentrates on a product detecting 100% of all the viruses “In The Wild” (ITW). Many of the samples which are present in India do not make to ITW List. All the products of VB 100% award are checked for only detecting the virus, most of the products fail in Indian Environment because the machine is pre infected or the anti-virus is not able to clean them. We decided to test the products with the test criteria which is unique to the Indian Environment.
We have set up the test in various levels.
Known Keylogger: Keylogger that is widely spread and is detect by a majority of antiviruses are anti keyloggers.
Unknown Keylogger: Keylogger sample that was developed exclusively for this test, hence unknown to any antivirus vendor.
Test for Webcam Hijacking: In this test, the machine is infected with malwares. These malwares hijack the webcam and the mic of the infected machine.
Test for MITB Attacks: In this test a malware is infected into the machine that is specifically specified to perform Man-in-the-Browser (MITB) attack.
Test for Clipboard Capture:In this test the machine is infected with a malware that is specifically designed to capture the clipboard contents.
Test for Screenshot capture:In this test the machine is infected with a malware that is specifically designed to capture the screenshots of the machine in which it is running.
Infecting the machine before installing the Antilogger:In this test the machines were infected with known malware before the antilogger is installed. The reason for this test is that most of Indian computers are already infect with some sort of malware before an antivirus is installed and the this test hopes to test if the antilogger is able to remove all previous infections after it is installed.
Infecting the machine after installing the Antilogger: In this test the computers are not infected with any keyloggers or malwares before the antilogger is installed. After the antilogger is installed, the machine is scanned for keyloggers and malwares.