Understanding Malware: Types and Classifications

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Malware

a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwise annoying or disrupting the victim.

2
New cards

Advanced Persistent Threat (APT)

Long-term cyberattacks targeted at businesses or political entities, often state-sponsored.

3
New cards

Adware

Software that displays ads, leading to pop-ups or browser redirections.

4
New cards

Attack kit

Tools for creating new malware using various propagation and payload methods.

5
New cards

Auto-rooter

Tools for hackers to remotely break into machines.

6
New cards

Backdoor (trapdoor)

Mechanisms that bypass security to allow unauthorized access.

7
New cards

Downloaders

Code that installs additional malware on a compromised machine.

8
New cards

Drive-by-download

Attacks exploiting browser vulnerabilities on compromised websites.

9
New cards

Exploits

Code targeting specific vulnerabilities.

10
New cards

Flooders (DoS client)

Tools generating data to carry out denial-of-service (DoS) attacks.

11
New cards

Keyloggers

Software capturing keystrokes on compromised systems.

12
New cards

Logic bomb

Code that triggers a payload when a specific condition is met.

13
New cards

Macro virus

Virus using macro code in documents to replicate itself.

14
New cards

Mobile code

Scripts or macros that run identically on different platforms.

15
New cards

Rootkit

Hacker tools used after gaining root-level access.

16
New cards

Spammer programs

Software sending large volumes of unwanted emails.

17
New cards

Spyware

Software collecting and transmitting information from a system.

18
New cards

Trojan horse

Programs with hidden malicious functions.

19
New cards

Virus

Malware replicating itself into other executable code.

20
New cards

Worm

Self-propagating program exploiting system vulnerabilities.

21
New cards

Zombie, bot

Program on an infected machine launching attacks on others.

22
New cards

Propagation Mechanisms

Methods by which malware spreads, including infection of existing content, exploitation of software vulnerabilities, and social engineering attacks.

23
New cards

Payload actions performed by malware

Actions such as corruption of system or data files, theft of service, theft of information, and stealthing.

24
New cards

Characteristics of Advanced Persistent Threats (APTs)

Attackers use a mix of tools and technologies, carry out determined and prolonged attacks, and are well-organized and well-funded.

25
New cards

Attacks of APTs

Attackers target organizations to steal sensitive information or disrupt infrastructure using methods like social engineering and targeted phishing.

26
New cards

Goal of attack

The goal is to infect systems with sophisticated malware with multiple propagation mechanisms and payloads.

27
New cards

Virus

A virus is software that infects programs by replicating itself and spreading to other content, especially in networked environments.

28
New cards

Infection Mechanism

How the virus spreads (a.k.a. infection vector).

29
New cards

Trigger

A condition or event (like a logic bomb) that activates the virus's payload.

30
New cards

Payload

The main action of the virus, which could be harmful or simply noticeable.

31
New cards

Dormant Phase

The virus is idle, waiting for an event to activate it (not always present).

32
New cards

Triggering Phase

The virus gets activated to perform its intended function.

33
New cards

Propagation Phase

The virus replicates and infects other programs or system areas.

34
New cards

Execution Phase

The virus carries out its function, which may be harmless or harmful.

35
New cards

Boot Sector Infector

Infects boot records and spreads when booting from an infected disk.

36
New cards

File Infector

Infects executable files used by the operating system.

37
New cards

Macro Virus

Targets documents with macro or scripting code that is interpreted by an application.

38
New cards

Multipartite Virus

Infects files in multiple ways.

39
New cards

Encrypted Virus

A portion of the virus creates a random encryption key and encrypts the remainder of the virus.

40
New cards

Stealth Virus

Designed to avoid detection by antivirus software.

41
New cards

Polymorphic Virus

Changes its code with every infection.

42
New cards

Metamorphic Virus

Completely rewrites itself with each iteration, altering behavior and appearance.

43
New cards

Macro and Scripting Viruses

A virus that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate.

44
New cards

Why They're Dangerous (Macro Viruses)

They work across different platforms, infect documents instead of executable files, spread easily among user documents, and are simpler to create or alter compared to traditional executable viruses.

45
New cards

Worm

Program actively seeks out more machines to infect and serves as automated launching pad for attacks on other machines.

46
New cards

Worm Replication Methods

Methods include Email & Instant Messaging, File Sharing, Remote Execution, Remote File Access & Transfer, and Remote Login.

47
New cards

Target Discovery Methods for Worms

Methods include Scanning (Fingerprinting), Random Scanning, Hit-List Scanning, Topological Scanning, and Local Subnet Scanning.