1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
malware
software created to harm systems, networks, devices, apps, or users.
ransomware
malware that takes over a device until a ransom is paid.
crypto malware
ransomware were an attacker prevents a user from accessing a file by encrypting until they pay ransom
lateral movement process
The method used by attackers to gain access to other devices on a network after the initial breach
trojan
malware disguised as legitimate software, think troy
trojan
a user downloads a malicious version of a legitimate app. The user runs the app, which collects user and device information and sends it to a remote server. The attacker can now control the device from the server. What malware is at play here?
Trinida
A trojan that delivered malware by posing as modified versions of WhatsApp
remote access trojans (RATS)
trojan that provide attackers with remote access to devices by posing as legitimate remote access tools.
command and control (c&c)
servers or systems attackers use to control comprimised devices
botnet
a network of infected hosts
worm
malware that is self-spreading and self-installing.
spyware
malware used to gather information on a system, person, or organization.
stalkerware
type of spyware used to illegally gather information on a romantic partner
hands-on-keyboard attack
An attack where the attacker is controlling the infected system in real-time
bloatware
unwanted software an apps installed on devices by manufactuers
call home function
function of a software or app where it contacts a remote server
virus
malware that self-copies and spreads after activation
memory-resident viruses
viruses that remain in a system’s memory while a device is running
non-memory resisdent virsus
viruses that shut down after execution and spreading
boot sector viruses
viruses that hide in the boot sector of a drive or other storage
macro viruses
viruses that use code within word processing apps or other apps to spread
email viruses
viruses that spread through email attachments or the email’s themselves
fileless virus
Viruses that spread via phishing emails and malicious websites by exploiting vulnerabilities in plug-ins and browsers themselves
keylogger
malware that captures keystrokes and other user input from a device
logicbomb
function or code within a program that executes when certain conditions are met but not independently
rootkits
malware that allows attackers to access resources through a backdoor
rootkit
what malware is difficult to detect with antimalware?
reverse proxy server
technique used by attackers where a compromised device initiates a connection with an attacker’s remote server.
backdoor
vulnerability that occurs during maitinance or troublshooting that attackers exploit for access