Malware Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

SOCIAL AND PROFESSIONAL ISSUES

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Malware

An umbrella term that describes any malicious program or code that is harmful to systems

2
New cards

Invade, Disable, Steal, Delete

Malware seeks to…

3
New cards

Adware

unwanted software designed to throw advertisements up on your screen, most often within a web browser. The user can both be aware or unaware that they’re infected by this malware

4
New cards

Adware

tracks a user’s surfing activity to determine which ads to serve them

5
New cards

Spyware

This malware collects information about users’ activities without their knowledge or consent. This can include passwords, pins, payment information and unstructured messages

6
New cards

Spyware

A malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. This malware collects information displayed in your monitor. User is unaware but it needs to be installed to work

7
New cards

Keyloggers

This malware is a type of spyware that monitors user activity through keyboard keystrokes. It can be inserted into a system through phishing, social engineering or malicious downloads

8
New cards

Keyloggers

Businesses can use this malware to monitor employee activity and families may use them to keep track of children’s online behaviors

9
New cards

Rootkits

It is software that gives malicious actors remote control of a victim’s computer with full administrative privileges. Designed to stay hidden from the user, other software on the system, and the operating system itself

10
New cards

Rootkits

A form of malware that provides the attacker with administrator privileges on the infected system, also known as “root” access

11
New cards

Rootkits

It can be used to conceal other malware, such as keyloggers

12
New cards

Virus

It is a piece of code that inserts itself into an application and executes when the app is run

13
New cards

Virus

Once inside a network, this malware may be used to steal sensitive data, launch DDoS attacks or conduct ransomware attacks

14
New cards

Virus

A malware that attaches to another program and, when executed—usually inadvertently by the user—replicates itself by modifying other computer programs and infecting them with its own bits of code

15
New cards

Worm

A type of malware similar to viruses. Like viruses, they are self-replicating. It doesn’t need a trigger; it can spread across system on its own

16
New cards

Worm

This malware targets vulnerabilities in operating systems to install themselves into networks

17
New cards

Trojan

It is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you

18
New cards

Ransomware

A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to regain access

19
New cards

Internet and Email

common ways that malware access your system

20
New cards

Robbinhood

a ransomware that hit the city of Baltimore

21
New cards

DarkHotel

a spyware which targets business and government leaders using hotel WiFi

22
New cards

Emotet

Trojan. It evades a signature-based detection

23
New cards

Stuxnet

A worm that was probably developed by the US and Israeli intelligence forces with the intent of setting back Iran’s nuclear program

24
New cards

Zacinlo

a rootkit that infects systems when users download a fake VPN app

25
New cards

Olympic Vision

a keylogger has been used to target US, Middle Eastern and Asian businessmen for business email compromise (BEC) attacks

26
New cards

Brain

a virus. Industry standard name for a malware

27
New cards

Melissa

a mass-mailing virus that targeted Microsoft Word and Outlook-based systems and created considerable network traffic

28
New cards

WannaCry

a ransomware that targeted computers running Microsoft Windows

29
New cards

Zeus

aka Zbot. It is a Trojan horse that was discovered after the cyberattack on the United States Department of Transportation

30
New cards

Pegasus

a spyware developed by Israeli cyber-intelligence firm NSO Group for eavesdropping on mobile phones and harvesting their data

31
New cards

Shlayer

a Trojan that disguised as a legitimate download. It affected 10% of Macs analyzed by Kaspersky

32
New cards

Back Orifice

released in 1988 and first widely recognized computer rootkit created by hacker group called Cult of the Dead Cow

33
New cards

rootkit

What kind of malware is Back Orifice?

34
New cards

trojan

What kind of malware is Shlayer?

35
New cards

spyware

What kind of malware is Pegasus?

36
New cards

trojan

What kind of malware is Zeus?

37
New cards

ransomware

What kind of malware is WannaCry?

38
New cards

virus

What kind of malware is Melissa?

39
New cards

virus

What kind of malware is Brain?

40
New cards

keylogger

What kind of malware is Olympic Vision?

41
New cards

rootkit

What kind of malware is Zacinlo?

42
New cards

worm

What kind of malware is Stuxnet?

43
New cards

trojan

What kind of malware is Emotet?

44
New cards

spyware

What kind of malware is DarkHotel?

45
New cards

ransomware

What kind of malware is Robbinhood?