1.1 Malware Flashcards
Given a scenario, analyze indicators of compromise and determine the type of malware
Piece of Software that gets onto a system
- Attach to other files
- Propagate
- Spread to other devices
- Active
Virus
Malware that attacks a computer by restricting the user’s access to files stored in the computer.
Crypto-malware
Locks user system until user pays the attacker in some form
Ransomware
Can replicate and spread without any human activation
Worm
Software that looks legitimate but has ulterior motives
-Not self propagated. Must have been installed on System by a user
Trojan
Software that escalates privileges to execute other things on a computer
Rootkit
Records keystrokes to collect information
Keylogger
software that automatically displays or downloads advertising material (often unwanted) when a user is online
Adware
Form of Malware that is hidden and tracks user activity
Spyware
Can be programmed/hacked to break into user accounts, scan the internet for contact information, to send spam, or perform other harmful acts.
Bots
Remote Access Trojan
-Must be activated remotely by someone
RAT
Program that is present on a system but does not do anything until triggered by an event
- Does not Propagate
- Example: Logic bomb activates if a disgruntled employee’s account is deactivated.
Logic bomb
Malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware
Backdoor