1 - 1: Malware Flashcards

1
Q

The two components of malware

A

Propagation method and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What defines a virus?

A

Spreads based on human action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What defines a worm?

A

Spreads by finding vulnerabilities without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The RTM worm

A

Written by Robert Tappen Morris, a Cornell grad student, infected 10% of the Internet in 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stuxnet

A

Infected Iranian nuclear enrichment centrifuges in 2010, crossing the virtual/physical barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What defines a Trojan horse?

A

Disguised as helpful programs that spread a payload while also working as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you protect from Trojan horses?

A

Application control limiting apps to only approved ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote Access Trojans

A

Provide hackers remote access to and control of compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adware

A

Malware designed to display ads but generates revenue for the malware author

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adware mechanisms

A

Changing default search engine, displaying pop-ups, replacing legitimate ads with malicious ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Malware that gathers information without user consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware mechanisms

A

Keylogging, monitor web browsing, searching hard drives and cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Potentially unwanted programs (PUPs)

A

Apps that are slipped in or bundled with other software installers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Encrypts files with a secret key, preventing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WannaCry

A

A ransomware variant that spreads with EternalBlue in 2017 demanding Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptomalware

A

Malware that takes over victim computing power to mine for cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Top 3 ways to prevent malware

A

Anti-malware software, applying patches, educating users

18
Q

Backdoor

A

A workaround to accessing a system

19
Q

Backdoor Mechanisms

A

Hardcoded accounts, default passwords, unknown access channels

20
Q

Logic bombs

A

Malware designed to execute a payload once certain conditions are met

21
Q

Logic bomb conditions

A

Date and time, file contents, API call results

22
Q

Root account

A

A special superuser account that provides unrestricted access to system resources

23
Q

Rootkits

A

Originally designed for privilege escalation that would provide root privileges to a regular account or escalate to root account

24
Q

Rootkit payloads

A

Backdoors, botnet agents, adware/spyware, OR anti-theft mechanisms for copyrighted content

25
Q

Ring protection model

A

Levels of user privileges, including user and kernel mode

26
Q

User mode rootkits

A

Run with normal user privileges, are easy to write and difficult to detect

27
Q

Kernel mode rootkits

A

Run with system privileges, are difficult to write and easy to protect

28
Q

Fileless Viruses

A

Malware that remains completely within memory and are not written to disk

29
Q

Fileless techniques

A

Microsoft Office macros, JavaScript code, Windows Registry persistence by copying itself

30
Q

Botnets

A

A network of infected computers delivered through malware, then awaits commands

31
Q

Botnet uses

A

Renting out computing power, delivering spam, engaging in DDoS, mining cryptocurrency, waging brute force attacks

32
Q

Botnet command and control

A

Indirect and redundant communication from a hacker to its network of botnet infected computers, including IRC, Twitter, and P2P within the botnet

33
Q

Script

A

Sequence of instructions written in a programming language to automate work

34
Q

Shell Scripts

A

Scripts run at the command line and integrate with the operating system

35
Q

Application scripts

A

Run within a software application and integrate with that application

36
Q

Programming languages

A

Allow for the creation of general purpose code

37
Q

Bash

A

A scripting language commonly used on Linux and Mac systems

38
Q

PowerShell

A

A scripting language allowing for automation on Windows systems

39
Q

Macros

A

Scripts that run within an application environment

40
Q

Visual Basic for Applications

A

A macro scripting language for Microsoft Office

41
Q

Python

A

A general purpose scripting language