3.malware

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

ransomware

malware that encrypts a device's files or steals them until the user pays ransom

2
New cards

crypto malware

type of ransomware that makes files inaccisble through encryption

3
New cards

trojan

What malware is described here. A user downloads malware disguised as a legitimate software or app. When the user runs the malware, it collects data and sends it to a remote command & control server. Think of a horse statue with enemy soliders inside.

4
New cards

remote access trojan

A type of Trojan that infects systems by posing as legitimate remote access tools. Once the user downloads the Trojan, the attacker has remote access to the infected system. The acronym is RATS

5
New cards

command & control

remote server attackers use to remotely issue commands to infected systems. The infected device issues a call home function that allows the attacker to communicate with and exfiltrate data from the compromised device. The initial are C&C

6
New cards

botnet

Malware in an infected device under the control of a C&C spreads to other devices on the same network, which gives the attacker remote access to those devices. What is being described here? Think of zombies.

7
New cards

worm

malware that self-activates and spreads from system to system and network to network without user interaction.

8
New cards

spyware

malware that secretly gathers information from a system. Think of what an intelligence operative at an intelligence agency does.

9
New cards

injection attacks against browsers

spyware IoC, akin to a spy placing eavesdropping devices in an office.

10
New cards

stalkerware

A type of spyware used to illegally spy on a romantic partner. Think of the individual who would do this; what are they called?

11
New cards

keylogger

malware that captures user keystrokes from a system. Usually done to steal credentials.

12
New cards

logicbomb

malicious code programmed to run when certain conditions are met, such as time and date or user action. It never runs independently. Think of something that goes of when a timer reaches zero.

13
New cards

rootkit

Malware that exploits a system’s backdoor to gain root-level access to a system. It remains hidden by altering a compromised system’s files.

14
New cards

virus

malware that self-copies and spreads to other devices on the same network after user interaction. Compare it to the term for a type of sickness

15
New cards

memory-resident virus

A type of virus that remains in a system’s memory after user interaction.

16
New cards

non-memory-resident virus

A type of virus that shuts down after spreading and activates after a user interaction. It doesn’t remain in a system’s memory

17
New cards

boot sector virus

A type of virus that hides in the boot sector of a hard drive or other storage devices, allowing it to activate and spread when booting up a device while avoiding detection

18
New cards

marco virus

A type of virus that exploits the macro functionality of apps like word processors and spreadsheets to infect and spread. It commonly disguises itself as a legitimate macro.

19
New cards

boot sector

Part of a hardrive or other storage device that’s the first to run when starting a device. Think of what cowboys were on their feet.

20
New cards

macro

Function of several apps, mostly word processors and spreadsheets, that allow users to automate repetitive tasks in those apps.

21
New cards

email virus

A type of virus that spreads through phishing emails or their attachments.

22
New cards

fileless virus

A type of virus that spreads via phishing email or malicious site by exploiting vulnerabilities in web browsers, plug-ins, or other apps to hide in a system’s memory. Once it reaches the memory of a system, it doesn’t create malicious files.

23
New cards

boot sector, memory-resident, non-memory-resident, email, macro, and fileless

list the 6 types of viruses

24
New cards

An email virus requires that the user open the file in an email while a fileless virus exploits a vulnerabilities in a web browser, plug-in, or other app without downloading malicious files.

difference between an email and fileless virus

25
New cards

worm:no user interaction virus:user interaction

The difference between a worm and a virus. what does one need to run that the other does not

26
New cards

backdoor

vulnerability created during maintenance that gives attackers remote access to a system or network by bypassing routine security controls. Think of maintenance workers leaving a door unlocked after they finish.

27
New cards

Communication between compromised systems and suspicious IP addresses or remote servers.

ransomware, trojans, and rootkits IoC, akin to communicating with a stranger before being kidnapped or worse.

28
New cards

legitimate tools are used in irregular ways to maintain control of a system.

A ransomware IoC where an encryption program is used to encrypt multiple files without a user’s knowledge or consent.

29
New cards

lateral movement processes are used to gather information on other systems in a network.

A ransomware IoC where the malware goes to steal and encrypt files on different devices

30
New cards

lateral movement process

The process used by attackers during ransomware attacks to gain control of other systems on a network. Think of how offices with devices are structured in an office. There’s a desk in front of you, behind you, and to your side.

31
New cards

files are encrypted by someone other than the user. A message from an attacker informs the user of the encryption until ransom is paid.

A ransomware IoC that’s essentially the primary thing it does

32
New cards

data extraction of large files until a ransom is paid.

A ransomware IpC that’s akin to a kidnapper asking for ransom.

33
New cards

finding files and folders not created by a user in a system.

trojan IoC that’s akin to Greek soldiers taking positions in Troy after exiting the horse statue but in the digital realm.

34
New cards

An attacker gains remote access to a system, usually to gather information.

spyware IoC that’s essentially it’s primary purpose.

35
New cards

Finding known software fingerprints in a system.

spyware IoC. A counterintelligence agent finds fingerprints belonging to mole in their agency. Apply that to the digital realm.

36
New cards

Malicious processes disguise themselves as system processes.

spyware IoC, akin to a spy pretending to be a foreign aid worker to gain a public official’s trust.

37
New cards

spyware

injections attacks against browsers akin to platning eavesdropping devices.

38
New cards

Finding known malicious files and additional components from remote systems.

worm IoC, akin to a worm shitting all over your floor but in the digital space.

39
New cards

compromised device is communicating with and under the control of a remote server.

worm IoC compared to a criminal taking control of an office and communicating with others located at hq.

40
New cards

Systems commands are used for injections and other malicious acts and evidence of a hands-on-keyboard attack.

worm IoC that involves remote control, but with code.

41
New cards

hands-on-keyboard attack

An attack where an attacker controls a system remotely in real-time and not through automated scripts. What do you call the act of doing something rather than theroy and what would an attacker use in this type of attack?

42
New cards

Finding file hashes and signatures.

keylogger and rootkit IoC compared to finding evidence of a break-in, such a broken locks and a thief’s calling cards, but in the digital space.

43
New cards

data exfiltration sends data such as user input back to a remote C&C server.

keylogger IoC that’s essentially it’s primary purpose

44
New cards

phishing campaigns

how are ransomware attacks usually carried out? hint, it involves a form of deceptive communication?

45
New cards

ransomware

storing files in a backup system is a mitigation effort for what malware? In what situation can you benefit from having a backup of a file that can’t be accessed?

46
New cards

security awareness and antimalware of EDR that can detect Trojan and RAT-like behaviors

3 ways to mitigate trojans. Think of training employees to identify impostors, and if the guards defending a building inspect a gift before letting it in. Now apply that to the digital realm.

47
New cards

spyware

what malware tracks user actions such as browsing activity and installed apps and reports back to a remote C&C server?

48
New cards

security awareness, managing installed apps, and spyware.

what are three ways to mitigate spyware? compare it to teachers telling students not to talk to strangers, airport security, and the job of a counterintelligence specialist but in digital format.

49
New cards

security awareness and antimalware detecting viruses in a systems memory, disk, or during execution

two ways to mitigate viruses? Compare it to a professor teaching students about viruses and other diseases and a police officer finding criminals hiding in two places or in the act of commiting a crime.

50
New cards

ransomware: takes over the device until ransom is paid. trojan: disguises itself as legitimate software. worm: self-spreading and installing without user interaction. spyware: collects user and system data. bloatware: unwanted software. virus: self-copies and spreads after user interaction. keylogger: captures keystrokes and other user actions. logic bomb: malicious code that executes under certain conditions. rootkit: sneaky malware that provides an attacker with privileged access.

compare the types of malware. think of kidnappers disguised as cops, horse statue with enemy combatants, autonomy, underground bugs, the NSA, unsolicited products, COVID, reading someone’s diary, something set to go off when a timer ends, and a sneaky thief sleeps with your wife.

51
New cards

the trigger is the conditions that execute the virus and the payload is the malicious actions of the virus.

describe the trigger and payload functions of a virus? compare them to the functions of a bomber plane or a soldier with a rocket launcher.

52
New cards

trojan, worms, and viruses

what malware is antimalware effective against? Think of a horse statue, a bug that lives underground, and COVID.

53
New cards

trojans and worms

what two malware are EDR tools effective against? Think of the horse statue and the bug that lives underground

54
New cards

trojans, spyware, and viruses

what 3 malware are effectively handled through security awareness training? think of a horse statue, the NSA, and COVID.

55
New cards

discovering suspicious behaviors such as unwanted background services, executables, and system configurations.

rootkit IoC akin to a thief leaving evidence of a break-in, such as a surprise in the toilet, broken items, leaving the fan on.

56
New cards
57
New cards
58
New cards
59
New cards
60
New cards