1 - 1: Malware Flashcards

1
Q

The two components of malware

A

Propagation method and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What defines a virus?

A

Spreads based on human action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What defines a worm?

A

Spreads by finding vulnerabilities without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The RTM worm

A

Written by Robert Tappen Morris, a Cornell grad student, infected 10% of the Internet in 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stuxnet

A

Infected Iranian nuclear enrichment centrifuges in 2010, crossing the virtual/physical barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What defines a Trojan horse?

A

Disguised as helpful programs that spread a payload while also working as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you protect from Trojan horses?

A

Application control limiting apps to only approved ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Access Trojans

A

Provide hackers remote access to and control of compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adware

A

Malware designed to display ads but generates revenue for the malware author

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adware mechanisms

A

Changing default search engine, displaying pop-ups, replacing legitimate ads with malicious ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Malware that gathers information without user consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware mechanisms

A

Keylogging, monitor web browsing, searching hard drives and cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Potentially unwanted programs (PUPs)

A

Apps that are slipped in or bundled with other software installers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Encrypts files with a secret key, preventing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WannaCry

A

A ransomware variant that spreads with EternalBlue in 2017 demanding Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptomalware

A

Malware that takes over victim computing power to mine for cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Top 3 ways to prevent malware

A

Anti-malware software, applying patches, educating users

18
Q

Backdoor

A

A workaround to accessing a system

19
Q

Backdoor Mechanisms

A

Hardcoded accounts, default passwords, unknown access channels

20
Q

Logic bombs

A

Malware designed to execute a payload once certain conditions are met

21
Q

Logic bomb conditions

A

Date and time, file contents, API call results

22
Q

Root account

A

A special superuser account that provides unrestricted access to system resources

23
Q

Rootkits

A

Originally designed for privilege escalation that would provide root privileges to a regular account or escalate to root account

24
Q

Rootkit payloads

A

Backdoors, botnet agents, adware/spyware, OR anti-theft mechanisms for copyrighted content

25
Ring protection model
Levels of user privileges, including user and kernel mode
26
User mode rootkits
Run with normal user privileges, are easy to write and difficult to detect
27
Kernel mode rootkits
Run with system privileges, are difficult to write and easy to protect
28
Fileless Viruses
Malware that remains completely within memory and are not written to disk
29
Fileless techniques
Microsoft Office macros, JavaScript code, Windows Registry persistence by copying itself
30
Botnets
A network of infected computers delivered through malware, then awaits commands
31
Botnet uses
Renting out computing power, delivering spam, engaging in DDoS, mining cryptocurrency, waging brute force attacks
32
Botnet command and control
Indirect and redundant communication from a hacker to its network of botnet infected computers, including IRC, Twitter, and P2P within the botnet
33
Script
Sequence of instructions written in a programming language to automate work
34
Shell Scripts
Scripts run at the command line and integrate with the operating system
35
Application scripts
Run within a software application and integrate with that application
36
Programming languages
Allow for the creation of general purpose code
37
Bash
A scripting language commonly used on Linux and Mac systems
38
PowerShell
A scripting language allowing for automation on Windows systems
39
Macros
Scripts that run within an application environment
40
Visual Basic for Applications
A macro scripting language for Microsoft Office
41
Python
A general purpose scripting language