1.1 Analyze indicators of compromise and determine the type of malware. Flashcards
Viruses
A type of malware designed to replicate and spread from computer to computer.
Crypto-Malware
Class of ransomware which encrypts data files. The user will be unable to access there files without the private encryption key. Only mitigation technique is to have up-to-date backups of encrypted files.
Ransomware
A type of Trojan malware that tries to extort money from the victim. Uses payment methods like wire transfer, gift cards.
Worm
A memory-resident virus that replicates over a network. Rapidly consumes network bandwidth as the worm replicates.
Trojan
A malware code concealed within an application package that the user thinks is benign.
RAT
A backdoor Trojan. Mimics the functionality of legitimate remote control programs. Once installed, the attacker can access the PC, upload files and install software.
Backdoor
RAT’s. Backdoors may be created for testing or by misconfiguraion
Rootkit
A class of backdoor malware that is hard to detect and remove. Rootkits change core system files and programming interfaces, so that shell processes and port scanning tools no longer reveal their presence.
Keylogger
Spyware/Trojans that attempt to steal information via keystrokes.
Adware
Any type of software or browser plug-in that displays commercial offers and deals
Spyware
A program that monitors user activity and sends the information to someone else.
Logic Bomb
Malware that is configured to run after a user event. I.e. a disgruntled sys admin who leaves a scripted trap that runs after he is terminated.