1 - Threats, Attacks, & Vulnerabilities Flashcards
Name the 12 types of Malware.
Adware Spyware Virus Worm Trojan Rootkit Ransomware (Crypto–malware) Keylogger Backdoor Logic Bomb Botnet RAT
RAT means Remote Access Trojan here; Remote Access Tool in another context)
Definition of malware?
Software designed to infiltrate or damage a computer system without the owner’s informed consent.
Name the three types of mutating malware.
Oligomorphic Polymorphic Metamorphic
To detect malware, a scanning tool is used to find the pattern of a particular malware. To defeat this, attackers will use these three types of mutating malware.
(21)
Oligomorphic malware
Oligomorphic malware changes its internal code to one of a set number of preconfigured mutations when executed. The issue is that there is only a limited number of mutations and it will eventually change back to a known pattern and get caught by a scanner.
(21)
Polymorphic malware
Polymorphic malware changes its form once executed but keeps the function of the code the same. This is usually done by encrypting the code to hide it and then decrypt it once it is executed.
(21)
Metamorphic malware
Metamorphic malware completely rewrites it’s code and appears different every time it’s executed. It uses machine code to change its code and avoid pattern recognition.
(21)
Name the primary traits of malware.
Circulation Infection Concealment Payload Capabilities
Circulation - malware spreads rapidly to other systems, infecting as many systems as possible. This can be through network connections, emails, and USB flash drives.
Infection - once malware reaches a system through circulation, it must infect or embed itself into that system. It might run only once and store itself in memory or remain on a system and run an infinite number of times. Some malware attaches itself to legitimate programs, while others are standalone programs.
Concealment - malware with the ability to avoid detection by scanners. Some will morph into something else, others will embed into an existing process, or modify the underlying host OS.
Payload Capabilities - trait of malware referring to the action it performs. Some steal passwords or files, while others change system settings or delete programs and files.
(22)
Virus
A computer program that can copy itself (replicate) and infect a specific computer without the permission or knowledge of the owner. Spread by user action.
Once a virus is launched, it performs two actions:
— Unload the payload to do some kind of malicious action such as computer crash, erase files from the hard drive, change security settings, reformat the hard drive.
— Replicates itself - once the payload is triggered the virus will reproduce itself into another file on the same computer.
Name and describe the three forms of viruses.
Program virus Macro virus Armored virus (2 types)
Program virus - Infects executable programs.
Macro virus - a macro is a series of instructions grouped together in a single command, used on documents to automate complex tasks, and run when the document is open. A Macro virus is written in the macro language and will infect the document once the macro is run.
Armored virus - avoids detection from scanners. Two types:
— Swiss cheese infection -virus will encrypt its code, then divide the engine used to decrypt the code and inject those pieces throughout the infected program code making it harder to detect where the virus is located in the file system.
— Split infection - splits the actual virus code into several parts and the code is then inserted in several places in the infected code.
(23)
Ransomeware
Encrypts user files and demands a ransom before releasing the key.
Prevents use of the computer system or files unless a fee is paid.
a.k.a. crypto-ware, crypto ransomware
Examples that made the news are Reveton and Cryptlocker.
Worm
A Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any user intervention. It does this by taking advantage of vulnerabilities in an application or host operating system.
Causes damage like a virus by leaving a payload behind.
Once a Worm infects a computer, it searches across the network to find other computers with vulnerabilities to infect.
Trojan Horse
A Trojan is malicious code that mimics a legitimate program in order to steal sensitive data.
Masquerades as desirable software to trick users into installing it.
Sometimes simply referred to as Trojan.
What is the difference between a Virus, Worm, and a Trojan horse?
Virus
— will only affect one system.
— Inserts malicious code into a program or data file.
— Requires user interaction to spread to other systems via removable media or email.
— runs without user consent.
Worms
— propagate between systems by exploiting vulnerabilities on affected hosts.
— Does not require user interaction to spread to other computers; only a network connection.
— Does not infect files but can leave a destructive payload.
— runs without user consent.
Trojan
— appears as a legitimate program, but perform malicious actions.
— Runs with user consent.
— Like a virus, it cannot spread without user interaction.
Rootkit
A Rootkit is malware which consist of a program designed to hide or obscure the fact that the system has been compromised. It will actually change the operating system forcing it to ignore the malicious activity. It can also remove traces of itself by changing log files.
— Requires admin access to install.
— installation of a rootkit is usually preceded by privilege escalation.
— are incredibly hard to detect & even harder to remove.
— Once a rootkit has affected the system, the system cannot be trusted & usually will need to be reformatted & the operating system reinstalled.
Adware
Adware or advertising – supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Usually causes the following:
— Display objectionable content such as pornography or gambling sites.
— Causes frequent pop-up windows that use computer resources and slow down the computer.
— Unwanted ads
— Tracks a user’s online activities and sends a log to the attacker without the users knowledge or consent. This content is used to tailor ads to the user based on the sites they visit.