1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards
Malware
Any element of software performing an unwanted function from perspective of a legit user/owner of system
Ransomware
Encrypts a user’s data, demanding ransom in return for decrypting the data
Trojans
Means of delivering malicious software disguising inside a benign host file
Worms
Self-contained applications that don’t require becoming attached directly to a host file or hard drive to infect a system. Focused on replication and distribution, rather than damage and destruction. Also be designed as delivery mechanisms to deposit other types of malware.
Potentially unwanted programs (PUPs)
Any type of questionable software not specifically malware but still otherwise unwanted.
Virus
Programs designed to spread from one system to another through self-replication and perform a wide range of malicious activities. Reside in memory only, do not save themselves to local storage devices
Forms:
Common/file
Boot sector
Fileless
Command and control (C&C or C2)
Intermediary serving as host of connection between attacker and bots where commands are distributed and info exchanged. Assists attacker in remaining anonymous while controlling botnet agents.
Any communications system can be used as C&C including internet relay chat (IRC) channels, IM, FB accounts, Twitter accounts, etc.
Bots
It is used to describe a massive deployment of malicious code onto numerous compromised systems that are all remotely controlled by a hacker. The term botnet is a shortened form of the phrase “software robot network”.
Although they’re most commonly known to be used to perform DoS flooding attacks, they can also be used to transmit spam, password cracking, or perform any other malicious activity.
Cryptomalware (aka crypto mining/jacking)
Uses system resources to mine cryptocurrencies, often designed to remain hidden.
Logic bombs
Form of malicious code remaining dormant until triggering event/condition
Spyware
Form of malicious code collecting info about users w/o knowledge or permission
Keylogger
A PUP recording keystrokes. Usually stored in a file, sometimes stored in memory until transported.
Remote access trojan (RAT)
Malware granting a level of remote control access to a system
Rootkit
Malware embedded w/in OS. Can manipulate system info seen by OS and displayed to users, may replace OS kernel, device drivers, etc.
Backdoor
Refers to two types of attacks/problems:
Developer installed access method bypassing security restrictions, hard-coded account, password, or command sequence.
hacker installed remote-access remote-control tool.