1) Threat Landscape, Malware Types, Lab Setup & Static Analysis Flashcards
What are the three core categories of hackers? State the difference in motivation, and also state the target group most likely to be affected by their actions.
- *Hacktivist**: Politicaly / Idealogy motivated; Big companies / Government / Big media coverage; Examples=Anonymous/LulzSec/Sony hack.
- *Cybercriminals**: Hacks for money; Companies / Home Users; Examples=Ransomware/FakeAV/BankTrojans.
- *Nation State**: Espionage/Sabotage/Political; Gov/Big Companies/Core Infrastructure; Examples=Stuxnet/APT attacks/Regin.
What is CyberWar and what is CyberEspionage?
CyberWar: Attacks against core infrastructure, very short attack duration.
CyberEspionage: Uses hacking attacks to gain knowledge. Attack can take several months.
How does the Future Cybercrime Landscape looks like?
IoT malware, Crypto malware, Mininig malware, CyberWarfare, APT attacks, Public Opinion Manipulation, DDOS
What are DDOS attacks?
Distributed Denial of Service attacks. A lot of infected hosts (botnet) send request at the same time to the same target. The goal is to massivly flood the target in a way, that it can not response anymore. Service of target will be unavailable.
Explain Trojans
Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.
Explain Backdoors
Is a type of malware that opens a gate for attackers to access the infected system.
Explain RAT
Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.
Explain Computer Worms
Self-contained programs that are able to spread functional copies of itself to other computer systems across a network, normally via Email or other methods.
Explain Downloaders
Malware that downloads the actually payload after it gets executed.
Explain Droppers
Extract malware from own code.
Explain Botnets
Multiple infected systems that can be controlled by the bot owner.
Explain Spyware
Malware that collects sensitive data.
Explain Adware
Makes money from serving ads. Often tracks user behaviour.
Explain FakeAV
Fake anti-virus that cleans systems for money.
Explain Rootkits/Bootkits
Two types (user mode/kernel mode). Malware that hides itself from the OS. Compromisation is not clearly visible.