1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards
class of ransomware that attempts to encrypt data files.
Crypto-malware
type of Trojan malware that tries to extort money from the victim.
Ransomware
spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.
spyware
using a counterfeit card reader to capture card details, which can then program a duplicate.
Skimming
Password spraying
horizontal brute-force online attack. This means that the attacker chooses one or more common passwords (for example, “password” or 123456) and tries to use them in conjunction with multiple usernames.
what is a worm
memory-resident viruses that replicate over network resources. The primary effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates. A worm may also be able to perform a Denial of Service attack by crashing operating systems and servers.
multipartite virus
uses both boot sector and executable file infection methods of propagation.
macro virus
uses the programming features available in Microsoft Office files.
program virus
sequences of code insert themselves into another executable program. When executing the application, the virus code becomes active.
What is a PUP
Potentially unwanted programs (PUP) or potentially unwanted applications (PUA) is software installed alongside a package or from a computer store that the user did not request.
Trojans
malware concealed within an installer package for software that appears to be legitimate. Unlike a PUP, a trojan is a real threat to the system.
Viruses
malware that is not necessarily hidden and very noticeable by virus scanners. These usually come in the form of executables (.exe) or Dynamic-link Library (DLL) files.
allows remote control to a computer and allows the attacker to access the PC, upload files, and install software.
Remote Access Trojan (RAT)