1.2 analyze potential indicators to determine the type of attack Flashcards
crypto-malware
the process of encrypting the files in a ransomware attack
RAT
Remote Access Trojan
malware designed to allow an attacker to remotely control an infected computer.
Logic Bomb
a piece of code that is intentionally inserted into software to trigger a malicious function when certain conditions are met
- user event
- time or date
Adversarial AI
poison training data
Supply Chain Attacks
attack a distributor or servicer in the chain
limit vendors and contractors
Birthday Attack
a brute force attack that uses the birthday paradox to find collisions in a hash function
Command and Control
C2 attack
method that cybercriminals use to communicate with compromised devices within a target company’s network. In a C&C attack, an attacker uses a server to send commands to — and receive data from — computers compromised by malware.