Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

Section 5: Malware from Dion Training Security+ Course

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Malware

Any software that is designed to infiltrate a computer system without the user’s knowledge

2
New cards

Threat Vector

Specific method used by an attacker to infiltrate a victim’s machine

Examples: Unpatched software, installing code, phishing campaign or other vulnerabilites

3
New cards

Attack vector

A means by which an attacker gains access to a computer to infect the system with malware

4
New cards

Threat Vector vs Attack Vector

Threat Vector: Breaks into the system.

Attack Vector: Breaks into and infects the system.

5
New cards

Virus

Malicious software that attaches to clean files and spreads into a computer system

6
New cards

Worms

Standalone malware programs that replicate and spread to other systems by exploiting software vulnerabilities

7
New cards

Trojans

Malicious programs which appear to be legitimate software that allow unauthorized access to a victim’s system when executed

8
New cards

Ransomware

Encrypts a user’s data and holds it hostage until a ransom is paid to the attacker for decryption

9
New cards

Zombies

Compromised computers that are remotely controlled by attackers and used in coordination to form a botnet

10
New cards

Botnet

Network of zombies and are often used for DDoS attacks, spam distribution, or cryptocurrency mining

11
New cards

Rootkits

Malicious tools that hide their activities and operate at the OS level to allow for ongoing priveleged access

12
New cards

Backdoors

Malicious means of bypassing normal authentication processes to gain unauthorized access to a system

13
New cards

Logic Bombs

Embed code placed in legitimate programs that executes a malicious action when a specific condition or trigger occurs

14
New cards

Keyloggers

Record a user’s keystrokes and are used to capture passwords or other sensitive information

15
New cards

Spyware

Secretly monitors and gathers user information or activities and sends data to third parties

16
New cards

Bloatware

Unnecessary or pre-installed software that consumes system resources and space without offering any value to the user

17
New cards

Malware Exploitiation Techniques

Involve methods by which malware infiltrates and infects targeted systems

18
New cards

Boot Sector Virus

Stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up

19
New cards

Macro Virus

A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed

20
New cards

Program Virus

Tries to find executables or application files to infect with their malicious code

21
New cards

Multipartite Virus

A combination of a boot sector type virus and a program virus

22
New cards

Encrypted Virus

Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software

23
New cards

Polymorphic Virus

Advanced version of an encrypted virus, but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order

24
New cards

Metamorphic Virus

Able to rewrite itself entirely before it attempts to infect a given file

25
New cards

Stealth Virus

Not necessarily a specific type of virus as much as it is a technique used to prevent the virus from being detected by the anti-virus software

26
New cards

Armored Virus

Have a layer of protection to conufse a pgoram or a person who’s trying to analyze it

27
New cards

Hoax

A form of technical social engineering that attempts to scare end users into taking undesireable action on their system

28
New cards

Trojan

A piece of malicious software that is disguised as a piece of harmless or desireable software

29
New cards

Remote Access Trojan (RAT)

Type of Trojan that is widely used by modern atackers because it provides tha attacker with remote control of a victim machine

30
New cards

Command and Control Node

Responsible for managing and coordinating the activities of other nodes or devices within a network.

31
New cards

Kernel Mode

Allows a system to control access to things like device drivers, sound card, and monitor

32
New cards

DLL Injection

Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic-link library

33
New cards

Shim

Software code that is placed between two components

34
New cards

Backdoor

Used to bypass the normal security and authentication functions

35
New cards

Easter Egg

Insecure coding practice that was used by programmers to provide a joke or a gag gift to the users

36
New cards

Keylogger

Piece of software or hardware that records every single keystroke that is made on a computer or mobile device

37
New cards

Exploit Technique

Describes the specific method by which malware code infects a target host

38
New cards

Fileless Malware

Used to create a process in the system memory without relying on the local file system of the infected host

39
New cards

Most modern malware uses a two-stage deployment model. What are these two stages?

Stage 1: Dropper or Downloader—When a user clicks on a malicious link or opens a malicious file, malware is installed.
Stage 2: Downloader - Download an install a remote access Trojan to conduct command and control on the victimized system

40
New cards

Dropper

Initiates or runs other malware forms within a payload on an infected host

41
New cards

Downloader

Retrieves additional tools post the initial infection facilitated by a dropper

42
New cards

Shellcode

Encompasses lightweight code meant to execute an exploit on a given target

43
New cards

“Actions on Objectives” Phase

Comes directly after the threat actor has established a foothold on a victim using the two-stage deployment model. Here, threat actors will execute primary objectives to meet core objectives (data exfiltration or file encryption)

44
New cards

Concealment

Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasig log files, and hiding any evidence of malicious activities

45
New cards

Living Off the land

The threat actors try to exploit the standard system tools to perform intrustions