Section 17: Malware

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/200

flashcard set

Earn XP

Description and Tags

Based on Dion Training Study Guide

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

201 Terms

1
New cards

Virus

Malicious code that infects systems when executed and requires user action to spread

2
New cards

Virus (Propagation Method)

Typically spreads through infected files or applications, such as opening a malicious attachment or installing compromised software

3
New cards

Boot Sector Virus

Resides in the first sector of a hard drive and loads during system boot-up

4
New cards

Macro Virus

Embedded in document files like Word or Excel and executes when the document is opened

5
New cards

Program Virus

Infects executable programs or applications, spreading when they are launched

6
New cards

Multipartite Virus

Combines both boot sector and program infection methods to enhance persistence

7
New cards

Encrypted Virus

Uses encryption to hide its code, making it harder for antivirus tools to detect

8
New cards

Polymorphic Virus

Changes its code slightly each time it runs to evade detection mechanisms

9
New cards

Metamorphic Virus

Rewrites its own code entirely, making each instance unique and harder to trace

10
New cards

Stealth Virus

Hides its activity using various evasion tactics, often combining encryption and code mutation

11
New cards

Armored Virus

Obfuscates itself to resist analysis by security tools or researchers

12
New cards

Hoax Virus

A social engineering trick that scares users into installing real malware disguised as a fake warning

13
New cards

Worm

A self-replicating piece of malware that spreads automatically without user interaction

14
New cards

Worm (Infection Method)

Exploits system or network vulnerabilities to spread across devices

15
New cards

Worm Example (Nimda 2001)

Spread worldwide in 22 minutes using multiple attack vectors

16
New cards

Worm Example (Conficker 2009)

Infected millions of machines through unpatched Windows systems

17
New cards

Trojan (Trojan Horse)

Malware that pretends to be legitimate software but performs hidden malicious actions

18
New cards

Trojan (Operation)

Delivers the expected functionality while secretly compromising the system

19
New cards

Remote Access Trojan (RAT)

A type of Trojan that gives attackers full remote control over an infected system

20
New cards

Virus Summary

Requires user action to execute and spread between systems

21
New cards

Worm Summary

Spreads on its own through networks by exploiting vulnerabilities

22
New cards

Trojan Summary

Relies on deception, tricking users into installing what appears to be safe software

23
New cards

Malware Defense Summary

Keeping systems updated, applying patches, and running regular malware scans are critical for protection

24
New cards

Traditional Malware Techniques

Modify executable files or embed malicious macros into documents to activate malware when files are opened or executed

25
New cards

Traditional Malware (Example)

Worms that exploit system memory and spread via remote procedure calls

26
New cards

Fileless Malware

Malicious code that runs directly in system memory without relying on stored files, making it difficult to detect

27
New cards

Fileless Malware (Detection Evasion)

Bypasses traditional signature-based antivirus systems and erases traces after execution

28
New cards

Two-Stage Deployment Model

A layered approach where malware is deployed in phases to avoid detection and increase control

29
New cards

Stage One (Dropper)

Executes embedded malware immediately after being activated by user interaction

30
New cards

Stage One (Downloader)

Connects to external sources to retrieve additional malicious tools

31
New cards

Shell Code

Lightweight, low-level code that initiates the exploit and sets up the next stage

32
New cards

Stage Two

Installs advanced malware such as Remote Access Trojans and enables command and control of the infected system

33
New cards

Stage Two (Targets)

Focuses on infiltrating high-value assets like domain controllers or enterprise servers

34
New cards

Action on Objectives Phase

The attacker’s goals after system compromise, including data theft, ransomware deployment, and lateral movement

35
New cards

Action on Objectives (Examples)

Exfiltration of sensitive data, encryption of files for ransom, or spreading malware across the network

36
New cards

Concealment Techniques

Methods used to hide malicious activity and maintain access without detection

37
New cards

Concealment Methods

Includes deleting logs, modifying file timestamps, and hiding executable traces

38
New cards

Code Injection

Technique that inserts malicious code into legitimate processes to blend in with normal operations

39
New cards

Masquerading

Malware pretends to be trusted software to deceive users and security systems

40
New cards

DLL Injection

Malicious code inserted into dynamic link library files to execute within legitimate programs

41
New cards

DLL Sideloading

Loads a malicious DLL instead of a legitimate one to hijack software execution

42
New cards

Process Hollowing

Replaces the memory of a legitimate running process with malicious code while keeping its appearance intact

43
New cards

Anti-Forensic Techniques

Strategies used to avoid detection and make analysis more difficult

44
New cards

Anti-Forensics (Encryption)

Encrypts malware to hide its contents from security tools

45
New cards

Anti-Forensics (Compression)

Stores malware in compressed formats to reduce visibility

46
New cards

Anti-Forensics (Obfuscation)

Alters code appearance and structure to confuse static analysis

47
New cards

Living off the Land (LotL) Techniques

Uses legitimate system tools (like PowerShell) to carry out attacks without installing new malware

48
New cards

LotL (Example)

PowerShell used to download, execute, or exfiltrate data without triggering antivirus alerts

49
New cards

Modern Malware Awareness

Staying informed on advanced techniques is crucial to effective cyber defense

50
New cards

Malware Monitoring Strategy

Watch for unusual use of legitimate tools like PowerShell or WMI to detect threats

51
New cards

Malware Mitigation Summary

Apply regular security updates, train employees, and monitor system behavior for early detection and prevention

52
New cards

Ransomware

Malware that prevents access to a victim's system or files until a ransom is paid

53
New cards

Ransomware (Mechanism)

Encrypts files, locks users out of systems, or changes login credentials to block access

54
New cards

Ransomware (Example)

A screen displays "Your computer has been locked. Pay $200 via Bitcoin to regain access"

55
New cards

Ransomware (Risks)

Paying the ransom does not guarantee recovery of data and often results in financial loss

56
New cards

Ransomware (Additional Risk)

Victims may be targeted again or face data leaks even after payment

57
New cards

Ransomware Prevention (Backups)

Maintain regular, secure backups that are disconnected from the network

58
New cards

Ransomware Prevention (Updates)

Keep all software and operating systems patched to reduce exploitable vulnerabilities

59
New cards

Ransomware Real-World Example

In 2018, the City of Atlanta was attacked by SamSam ransomware

60
New cards

SamSam Attack (Cost)

Caused 17 million in total recovery costs, including 6 million in emergency services and 11 million in system upgrades

61
New cards

SamSam Attack (Recovery Decision)

The city chose not to pay the ransom and instead rebuilt its systems from scratch

62
New cards

Ransomware Summary

Malware that holds systems or files hostage in exchange for payment, often through encryption

63
New cards

Ransomware Risk Summary

Even if the ransom is paid, recovery is not guaranteed and further damage may occur

64
New cards

Ransomware Defense Summary

Regular offline backups and timely software updates are the most effective preventative measures

65
New cards

Spyware

Malicious software that secretly monitors user activity and gathers data without the user's knowledge or consent

66
New cards

Spyware (Access Points)

Can be installed through compromised websites, malicious downloads, or bundled third-party software

67
New cards

Spyware (Targets)

Monitors files, emails, browsing history, calendar events, and other private data

68
New cards

Keylogger

A type of spyware that records every keystroke made by a user

69
New cards

Keylogger (Data Captured)

Captures sensitive information such as usernames, passwords, and credit card numbers

70
New cards

Keylogger (Extra Capabilities)

May take screenshots and transmit stolen data to remote attackers

71
New cards

Stalkerware

Spyware intentionally installed by someone with physical or remote access to a device to track or control another person

72
New cards

Stalkerware (Capabilities)

Tracks location, reads texts and emails, monitors calls, and accesses the camera or microphone

73
New cards

Stalkerware (Common Uses)

Often used in abusive relationships for harassment or surveillance without the victim’s knowledge

74
New cards

Stalkerware Protection

Use strong passwords, keep devices updated, and monitor for suspicious or unfamiliar apps

75
New cards

Adware

Software that tracks online behavior to serve targeted advertisements

76
New cards

Adware (Impact)

Interrupts user experience with pop-ups or banner ads, slows device performance, and may expose users to further threats

77
New cards

Potentially Unwanted Programs (PUPs)

Unwanted software often bundled with legitimate installations, usually installed without clear user consent

78
New cards

PUPs (Behaviors)

Modify browser settings, show persistent ads, add toolbars, and degrade system performance

79
New cards

PUP Prevention

Always choose custom or advanced options during software installation and carefully review each step

80
New cards

Spyware Summary

Malicious surveillance software that invades privacy by secretly collecting sensitive information

81
New cards

Keylogger Summary

Records all keystrokes to steal credentials and other personal data

82
New cards

Stalkerware Summary

Spyware used for personal tracking, often involving abuse or harassment

83
New cards

Adware Summary

Tracks activity for targeted advertising and may degrade performance or open security gaps

84
New cards

PUP Summary

Bundled programs that often come with free software and negatively affect system functionality

85
New cards

Spyware Defense Summary

Use secure passwords, keep systems updated, and monitor for unfamiliar apps or system changes

86
New cards

Rootkit

Software designed to gain and maintain unauthorized administrative (root) control over a system while remaining undetected

87
New cards

Rootkit (Privilege Levels)

Targets high-level privileges such as Administrator on Windows or Root on Linux/Unix/macOS

88
New cards

Rootkit (System Permissions)

Granted full control to install or remove programs, open/close network ports, and modify critical configurations

89
New cards

Permission Rings

A hierarchy of privilege levels used by operating systems to separate user and system processes

90
New cards

Ring 3

Standard user access with limited permissions

91
New cards

Ring 1

Elevated access, typically administrative or root level

92
New cards

Ring 0 (Kernel Mode)

Full system-level control with access to core hardware and OS functions

93
New cards

Rootkit Placement

Often installed at Ring 0 or Ring 1 to gain deep access and evade detection from the OS or security software

94
New cards

Rootkit (Stealth Function)

Operates without the awareness of users, administrators, or even the operating system itself

95
New cards

DLL Injection

A technique where malicious code is inserted into running processes using dynamic link libraries during runtime

96
New cards

DLL Injection (Purpose)

Allows persistent control while blending in with legitimate system processes

97
New cards

Driver Manipulation

Involves modifying or exploiting system drivers that operate in kernel mode

98
New cards

Driver Manipulation (Effect)

Enables rootkits to perform malicious actions with full system access

99
New cards

Shim Use

Places a software layer between system components to intercept and alter system calls

100
New cards

Shim Use (Purpose)

Facilitates DLL injection and driver manipulation while making detection more difficult