Lesson 13: Analyze Indicators of Malicious Activity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Viruses

A type of malware that attaches itself to a file or program and spreads when you run it.

2
New cards

Worms

A type of malware that spreads on its own across networks, without needing you to run or open anything.

3
New cards

Trojan

A fake, harmless-looking program that tricks you into installing it, then secretly harms your computer or steals information.

4
New cards

Potentially Unwanted Programs (PUPs)

Programs that aren’t clearly harmful, but you probably didn’t ask for them, and they often do things like show ads or slow down your computer.

5
New cards

Multipartite

A type of virus that attacks in more than one way

6
New cards

Polymorphic

A type of malware that keeps changing how it looks so antivirus programs have a hard time spotting it.

7
New cards

Fileless Malware

A type of malware that runs in memory without saving files to the disk, making it harder to detect and remove.

8
New cards

Persistence Via the Registry

When malware adds itself to the Windows Registry so it automatically runs every time the computer starts.

9
New cards

Advanced Persistent Threat (APT)

A hacker’s ability to get into a network and stay there secretly to keep control and steal data over time.

10
New cards

Advanced Volatile Threat (AVT)

Runs only in memory (RAM), so it disappears after a restart and is harder to find than regular malware.

11
New cards

Low Observable Characteristics (LOC)

Ways attackers stay hidden, using quiet, sneaky methods so security tools don’t notice them.

12
New cards

Spyware

A program that secretly watches what you do on your device and sends that information to someone else

13
New cards

Adware

Software that watches what you and shows you ads based on that information

14
New cards

Keyloggers

Spyware that secretly records what you type to steal your private information.

15
New cards

Remote Access Trojan (RAT)

A type of malware that lets a hacker take control of your computer through a hidden connection.

16
New cards

Rootkit

Malware that hides by changing deep parts of your system, so you can’t see it or remove it easily.

17
New cards

Ransomware

A broad term for any malware that blocks access to your system or data and demands a ransom.

18
New cards

Crypto-malware

A specific type of ransomware that encrypts your files (using cryptography) and demands payment to decrypt them.

19
New cards

Cryptomining/cryptojacking

A virus that steals your computer’s power to make digital money for someone else.

20
New cards

Logic Bomb

A malicious program that is set to run under particular circumstances or in response to a defined event.

21
New cards

Tactics, Techniques, Procedures (TTPs)

Describes what attackers do, how they do it, and the exact tools or steps they use during a cyberattack.

22
New cards

Indicators of Compromise (IOC)

A sign that an asset or network has been attacked or is currently under attack.

23
New cards

Resource Consumption

When a computer uses more power or memory than usual, which might mean malware is running in the background.

24
New cards

Distributed Denial of Service Attacks (DDoS)

An attack where hackers use many infected devices to overload a website or service, so real users can’t access it.

25
New cards

On-path Attacks

An attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic

26
New cards

DNS Poisoning

When hackers trick your computer into going to a fake website by changing the internet address behind a real domain name.

27
New cards

DNS-based On-path Attacks

When a hacker intercepts your request for a website and sends you to a fake one instead

28
New cards

DNS Client Cache Poisoning

When a hacker tricks your computer into remembering the wrong address for a website

29
New cards

Rogue Access Points

Unauthorized Wi-Fi that’s added to a network, sometimes by mistake or to secretly spy on users.

30
New cards

Evil Twin

A type of rogue access point that is intentionally set up to mimic a legitimate network, with the goal of tricking users into connecting so their data can be intercepted or stolen.

31
New cards

Brute Force Attack

A type of password attack where an attacker uses an automated tool to exhaustively try every possible combination of letters, numbers, and symbols to guess or crack a password.

32
New cards

Dictionary Attack

When a hacker tries passwords from a list of common ones to see if any unlock the account.

33
New cards

Password Spraying

When a hacker uses a few common passwords on lots of accounts to try and break into one without getting blocked.

34
New cards

Credential Replay Attacks

When a hacker uses a stolen login token to pretend to be someone else and access their account.

35
New cards

Downgrade Attacks

Makes a server or client use a lower specification protocol with weaker ciphers and key lengths.

36
New cards

Collision Attacks

When a weak hash function lets two different pieces of data create the same digital fingerprint

37
New cards

Birthday Attacks

A way hackers use brute force to find two things with the same hash

38
New cards

Replay Attack

When a hacker captures login info and uses it again to sneak back into a system.

39
New cards

Client-side Request Forgery (CSRF)/Cross-site Request Forgery (XSRF)

A hacker tricks your browser into doing something you didn’t intend

40
New cards

Server-side Request Forgery (SSRF)

When a hacker tricks a server into sending a request to another place that the hacker normally wouldn’t be allowed to reach.

41
New cards

Persistent Cross Site Scripting (XSS)

When a hacker stores bad code on a website, and it runs in other users' browsers when they visit that page.

42
New cards

SQL Injection

When a hacker adds fake commands to a website’s database, letting them steal, delete, or change information.

43
New cards

Directory Traversal

When a hacker uses special file paths to reach hidden or protected files on a website’s server.

44
New cards

Command Injection

When a hacker uses a website’s input to run system commands on the server, which can lead to full control of the system.

45
New cards

Uniform Resource Locator (URL)

The address of something on the internet

46
New cards

URL Principal Methods:

  • GET: Retrieve source

  • POST: Send data to server for processing by requested resource

  • PUT: Create or replace resource

47
New cards

Percent Encoding

Changes special characters into code-like symbols (like %20 for a space) so they don’t break a URL.