Certified Ethical Hacker (CEHv13) Module 07 Malware Threats

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

117 Terms

1
New cards

Malware

Malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware creator

2
New cards

Ways for Malware to Enter the System

- Instant Messenger Applications

- Portable Hardware Media/Removable Devices

- Browser and Email Software Bugs

- Insecure Patch Management

- Rogue/Decoy Applications

- Untrusted Sites and Free Web Applications/Software

- Downloading Files from the Internet

- Email Attachments

- Network Propogation

- File Sharing

- Installation by other Malware

- Bluetooth and Wireless Networks

3
New cards

Autorun/Autoplay/Autostart

A Windows feature that runs an executable program when a user connects a USB device or memory card

4
New cards

Techniques Attackers Use to Distribute Malware on the Web

- Black Hat Search Engine Optimization (SEO)

- Social Engineered Click Jacking

- Spear Phishing Sites

- Malvertising

- Compromised Legitimate Websites

- Drive-by-Downloads

- Spam Email

- Rich Text Format (RTF) Injection

5
New cards

Black Hat Search Engine Optimization (SEO)

Uses SEO tactics to get higher search engine rankings for malware pages

6
New cards

Social Engineered Click Jacking

Attackers inject malware into websites that appear legitimate to trick users into clicking them. When clicked the malware embedded in the link executes.

7
New cards

Spear Phishing SItes

This technique is used for mimicking legitimate institutions, such as banks, to steal passwords, credit card and bank account data, and other sensitive information.

8
New cards

Malvertising

Involves embedding malware-laden advertisements in legitimate online advertising channels to spread malware on systems of unsuspecting users

9
New cards

Drive By Downloads

Refers to the unintentional downloading of software via the Internet. Here, an attacker exploits flaws in browser software to install malware by merely visiting a website.

10
New cards

Spam Emails

Attacker attaches malicious file to an email and the victim is tricked into clicking the attachment and thus executes malware

11
New cards

RTF Templates

Used for specifying the document format in Microsoft Office

12
New cards

Rich Text Format (RTF) Injection

Attackers inject malicious macros into RTF files and host them on their servers. When a user opens the document, the malicious template is automatically retrieved from the remote server by evading security systems.

13
New cards

Components of Malware

- Crypter

- Downloaders

- Dropper

- Exploit

- Injector

- Obfuscator

- Packer

- Payload

- Malicious Code

14
New cards

Crypter

Conceals existence of malware to elude antivirus detection. It protects malware from reverse engineering or analysis.

15
New cards

Downloader

A type of trojan which downloads other malware

16
New cards

Dropper

o It is a covert carrier of malware. Attackers embed notorious malware files inside droppers, which can perform the installation task covertly. Attackers need to first install the malware program or code on the system to execute the dropper. The dropper can transport malware code and execute malware on a target system without being detected by antivirus scanners

17
New cards

Exploit

Part of malware which contains code or commands that can take advance of a bug or vulnerability

18
New cards

Injector

Program injects exploits or malicious code available in the malware into other vulnerable running processes

19
New cards

Obfuscator

Conceals malicious code making it difficult for security mechanisms to detect or remove it

20
New cards

Packer

Compresses Malware into Unreadable Format

21
New cards

Payload

Performs desired activity

22
New cards

Malicious Code

A piece of code that defines the basic functionality of the malware and comprises commands that result in security breaches

23
New cards

Potentially Unwanted Applications/ Programs (PUAs/PUPs)/Grayware/Junkware

Potentially harmful applications that may pose severe risks to the security and privacy of data stored in the system where they are installed. PUAs can degrade system performance and compromise privacy and data security. Most PUAs get installed when downloading and installing freeware using a third-party installer or when accepting a misleading license agreement.

24
New cards

Types of Potentially Unwanted Applications/ Programs (PUAs/PUPs)

- Adware

- Torrent

- Marketing

- Cryptomining

- Dialers

25
New cards

Adware

Display unsolicited advertisements offering free sales and pop-ups of online services when browsing websites

26
New cards

Marketing PUAs/PUPs

Monitor the online activities performed by users and send browser details and information regarding personal interests to third-party app owners. These applications then market products and resources based on users' personal interests.

27
New cards

Cryptomining

Make use of the victims' personal assets and financial data on the system and perform the digital mining of cryptocurrencies such as bitcoins

28
New cards

Dialers

Programs that get installed and configured in a system automatically to call a set of contacts at several locations without the user's consent. Dialers cause massive telephone bills and are sometimes very difficult to locate and delete.

29
New cards

Indicators of Adware

- Frequent System Lag

- Indurated Advertisements

- Incessant System Crash

- Disparity in the Default Browser Homepage

- Prescence of New Toolbar or Browser Add-Ons

= Slow Internet

- Unusual Network Traffic

- Difficulty Removing Unwanted Software

- Unauthorized Data Collection

30
New cards

Advanced Persistent Threat (APT)

A type of network attack whereby an attacker gains unauthorized access to a target network and remains in the network without being detected for a long time

31
New cards

Characteristics of APTs

- Objectives

- Timeliness

- Resources

- Risk Tolerance

- Skills and Methods

- Actions

- Attack Origination Points

- Numbers Involved in the Attack

- Knowledge Source

- Multi-Phased

- Tailored to the Vulnerabilities

- Multiple Points of Entries

- Evading Signature-Based Detection Systems

- Specific Warning Signs

- Highly Targeted

- Long-Term Engagement

- Use of Advanced Techniques

- Complex Command and Control (C2) Infrastructure

32
New cards

APT Lifecycle Phases

- Preparation

- Initial Intrusion

- Expansion

- Persistence

- Search and Exfiltration

- Cleanup

33
New cards

Trojan

A program in which malicious or harmful code is contained inside an apparently harmless program or data

34
New cards

Types of Trojans

- Remote Access Trojans

- Backdoor Trojans

- Botnet Trojans

- Service Protocol Trojans

- Mobile Trojans

- IoT Trojans

- Rootkit Trojans

- Security Software Disabler Trojans

- E-Banking Trojans

- Destructive Trojans

- Point-of-Sale Trojans

- Defacement Trojans

- DDos Attaack Trojans

- Command Shell Trojans

35
New cards

Remote Access Trojans (RATs)

Provides attackers with full control over the victim's system, thereby enabling them to remotely access files, private conversations, accounting data, etc

36
New cards

Backdoor Trojans

A program that can bypass the standard system authentication or conventional system mechanisms such as IDS and firewalls, without being detected. In these types of breaches, hackers leverage backdoor programs to access the victim's computer or network.

37
New cards

Botnet Trojans

Attackers use botnet Trojans to infect a large number of computers throughout a large geographical area to create a network of bots (or a "bot herd") that can achieve control via a command-and-control (C&C) center. Once the user downloads and executes this botnet Trojan in the system, it connects back to the attacker using IRC channels and waits for further instructions.

38
New cards

Rootkit Trojans

Potent backdoors that specifically attack the root or OS

39
New cards

E-Banking Trojans

They intercept the victim's account information before the system can encrypt it and send it to the attacker's command-and-control center. Attackers program these Trojans to steal minimum and maximum monetary amounts, so that they do not withdraw all the money in the account, thereby avoiding suspicion.

40
New cards

Transaction Authentication Number (TAN)

A single-use password for authenticating online banking transactions

41
New cards

TAN Grabber

Banking Trojans intercept valid TANs entered by users and replace them with random numbers. The bank will reject such invalid random numbers. Subsequently, the attacker misuses the intercepted TAN with the target's login details.

42
New cards

HTML Injection

The Trojan creates fake form fields on e-banking pages, thereby enabling the attacker to collect the target's account details, credit card number, date of birth, etc. The attacker can use this information to impersonate the target and compromise his/her account.

43
New cards

Form Grabber

A type of malware that capture's a target's sensitive data from a web browser form. It analyses POST requests and responses to the victim's browser. It compromises the scramble pad authentication and intercepts the scramble pad input as the user enters his/her Customer Number and Personal Access Code.

44
New cards

Cover Credential Grabber

Once the user attempts to make an online transaction, the Trojan covertly steals the login credentials and transmits them to the hacker

45
New cards

Components of E-Banking Trojans

- TAN Grabber

- HTML Injection

- Form Grabber

- Covert Credential Grabber

46
New cards

Point of Sale (POS) Trojans

A type of financial fraudulent malware that target POS and payment equipment such as credit card/debit card readers

47
New cards

Defacement Trojans

Can destroy or change the entire content of a database

48
New cards

Service Protocol Torjans

Take advantage of vulnerable service protocols

49
New cards

Types of Service Protocol Trojans

- VNC

- HTTP/HTTPS

50
New cards

HTTP/HTTPS Trojan

Creates a local shell on the victim's computer that connects to the webserver that the attacker owns through an HTTP request

51
New cards

Mobile Trojans

Target mobile phones

52
New cards

Internet of things (IoT)

The inter-networking of physical devices, buildings, and other items embedded with electronics

53
New cards

IoT Trojans

The Internet of things (IoT) refers to the inter-networking of physical devices, buildings, and other items embedded with electronics. IoT Trojans are malicious programs that attack IoT networks.

54
New cards

Security Software Disabler Trojans

Stop security programs by disabling them or killing the processes

55
New cards

Destructive Trojans

Delete files on target system

56
New cards

DDoS Attack Trojans

Intended to perform DDoS attacks. They make the victim a zombie that listens for commands sent from a DDoS Server on the Internet.. There will be numerous infected systems standing by for a command from the server, and when the server sends the command to all or a group of the infected systems, since all the systems perform the command simultaneously, a considerable amount of legitimate requests flood the target and cause the service to stop responding.

57
New cards

Command Shell Trojans

Provide a remote control command shell on the victim's machine

58
New cards

Steps to Infecting a Machine via a Trojan

1. Create a new Trojan packet

2. Employ a dropper or downloader to install the malicious code on the target system

3. Employ a wrapper to bind the Trojan executable with legitimate files

4. Employ a crypter to encrypt the trojan to evade detection

5. Propagate the trojan

6. Deploy the trojan on victim's machine by executing the dropper or downloading software

7. Execute damage routine

59
New cards

Overt

Something explicit, obvious, or evident

60
New cards

Covert

Something hidden or concealed

61
New cards

Overt Channel

A legal channel for the transfer of data or information in a company network, and it works securely to transfer data and information

62
New cards

Covert Channel

Illegal, hidden path used to transfer data from a network

63
New cards

Exploit Kit/Crimeware Toolkit

Used to exploit security loopholes found in software application by delivering malware to the target system

64
New cards

Viruses

Self-replicating programs that further infect machines with interaction from users

65
New cards

Stages of Virus Lifecycle

1. Design

2. Replication

3. Launch

66
New cards

Virus Phases

- Infection Phase

- Attack Phase

67
New cards

Virus Methods of Infecting

- Downloads

- Email Attachments

- Pirated software

- Failing to install security software

- Updating software

- Browser

- Firewall

- Popups

- Removable Media

- Network Access

- Backup and Restore

- Malicious Online Ads

- Social Media

68
New cards

Types of Viruses

- System or boot sector

- File

- Multipartite

- Macro

- Cluster

- Stealth/Tunneling

- Encryption

- Sparse Infector

- Metamorphic

- Overwriting File or Cavity

- Companion/Camouflage

- Shell

- File Extension

- FAT

- Logic Bomb

- Web Scripting

- Email

- Armored

- Add-On

- Intrusive

- Direction Action or Transient

- Terminate and Stay Resident (TSR)

69
New cards

File Viruses

File viruses insert their code into the original file and infect executable files

70
New cards

Multipartite Virus

Combines the approach of file and boot record infectors

71
New cards

Cluster Viruses

They infect files without changing the file or planting additional files. They save the virus code to the hard drive and overwrite the pointer in the directory entry, directing the disk read point to the virus code instead of the actual program.

72
New cards

Stealth/Tunneling Viruses

Try to hide from antivirus programs by actively altering and corrupting the service call interrupts while running

73
New cards

Sparse Infector

Infect less often to try to minimalize their probability of discovery

74
New cards

Metamorphic Viruses

Programmed such that they rewrite themselves completely each time they infect a new executable file

75
New cards

Overwriting File or Cavity Viruses

Overwrite host file without increasing the length of the file

76
New cards

Companion/Camouflage Virus

Stores itself with the same filename as the target program file

77
New cards

File Extension Virus

Changes extension of files

78
New cards

File Allocation Table (FAT) Virus

The FAT is a system used in Microsoft products and some other types of computer systems to access the information stored on a computer. FAT Viruses attack the index making it impossible for the computer to locate files.

79
New cards

Logic Bomb

Virus Triggered in Response to an Event

80
New cards

Types of Web Scripting Viruses

- Persistent

- Non-Persistent

81
New cards

Armored Viruses

Designed to confuse or trick deployed antivirus systems to prevent them from detecting the actual source of the infection

82
New cards

Anti-Emulation Techniques

Used to avoid dynamic analysis by fingerprinting the emulated system environment

83
New cards

Anti-Goat Techniques

Use heuristic rules to detect possible goat files such as a virus that cannot infect a file if it is too small or if it contains a large amount of do-nothing instructions.

84
New cards

Direct Action/Transient Viruses

Transfer all controls of the host code to where it resides in the

memory.

85
New cards

Terminate and Stay Resident (TSR) Virus

Remains permanently in the target machine's memory during an entire work session, even after the target host's program is executed and terminated.

86
New cards

Virus Hoaxes

False alarms claiming reports about a non-existing virus that may contain virus attachments video

87
New cards

Fake Antivirus

Malware designed to imitate legitimate security software, thereafter stealing information from unsuspecting users

88
New cards

Ransomware

A type of malware that restricts access to the infected computer system or critical files and documents stored on it, and then demands an online ransom payment to the malware creator(s) to remove user restrictions.

89
New cards

Worms

Are standalone malicious programs that replicate, execute, and spread across network connections independently without human intervention

90
New cards

Fileless Malware

Infects legitimate software, applications, and other

protocols existing in the system to perform various malicious activities.

91
New cards

Benefits of Fileless Malware

- Stealth

- Living off the Land (LOL)

- Trustworthy

- Persistence without files

- Simplify infection process

- Increased success rate in target attacks

- Complicating forensic analysis and incident response

92
New cards

Living off the Land

Exploit techniques that use standard system tools and packages to perform intrusions

93
New cards

Types of Fileless Malware

- Type 1: No file Activity Performed

- Type 2: Indirect File Activity

- Type 3: Required Files to Operate

94
New cards

Fileless Malware Stages

1. Point of Entry: Memory Exploits, Malicious Websites, Phishing Email/Malicious Document

2. Code Execution: Code Injection, Script-Based Injection

3. Persistence: Windows Registry, Windows Management Instrumentation (WMI), Windows Task Scheduler

4. Achieving Objectives

95
New cards

Obfuscation techniques used by fileless malware to bypass antivirus solutions

- Inserting characters, parentheses, caret symbols, and double quotes

- Using custom and pre-assigned environment variables

96
New cards

AI Based Malware

Refers to malicious software that harnesses AI methodologies and algorithms to amplify its functionalities and accomplish goals

97
New cards

Phases of AI Based Malware

1. Infiltration

2. Establishment

3. Learning Phase

4. Adaptation

5. Execution

6. Propagation

7. Evolution

98
New cards

Generative Adversarial Networks (GANs)

Used for generating new data that is similar to but distinct from the data on which they were trained

99
New cards

Natural Language Processing (NLP)

Focuses on the interaction between computers and humans through natural language. The primary goal of NLP is to enable computers to understand, interpret, and generate human languages in a valuable way.

100
New cards

Sheep dipping

Refers to the analysis of suspicious files, incoming messages, etc., for malware. The users isolate the sheep-dipped computer from other computers on the network to block any malware from entering the system.