1.2 Malware Flashcards
Ransomware
A type of malicious software designed to block access to a computer system or files until a sum of money is paid. Involves encrypting the victims files making them inaccessible and then displaying a ransom message with instructions on how to pay.
Torjans
A type of malicious software that disguises itself as something legitimate or benign but in reality carries a malicious payload. They rely on social engineering tactics.
Worms
A type of malicious software that is designed to spread across computer networks often without any user intervention. They can replicate independently and spread across networks by exploiting vulnerabilities in operating systems or other software.
Potentially Unwanted Programs
Software applications that, while not necessarily malicious, may exhibit behavior said users may find under desirable or unwanted. Often bundled with legitimate software or offered as optional installations during the installation process of another program.
Fileless Virus/Fileless Malware/Memory Based Malware
A type of malicious software that operates in a system’s memory (RAM) Rather than relying on traditional files stored on the hard drive. Unlike traditional viruses or malware that involve the creation of an executable file on a disk, fileless malware resides in a computer’s volatile memory, making it more challenging to detect and analyze.
Command and Control
Refers to the communication and control infrastructure used by attackers to manage and direct compromise the devices or systems within a network. Associated with botnets, remote access Trojans(RATs), and other forms of malicious software.
Bots
Refers to a software application that performs automated tasks. Can have both legitimate and malicious purposes, and are designed to interact with the computer systems or network in various ways.
Cryptomalware
A type of malicious software design to encrypt a user’s files or even their entire system rendering their data inaccessible.
Logic Bomb
A type of malicious software or code that is intentionally inserted into a program or system with the purpose of triggering a harmful event or action under specific conditions or at a predetermined time. Usually dormant.
Spyware
A type of malicious software that is designed to covertly observe and gather information about a user’s activities on a computer or device without their knowledge or consent.
Keylogger/ Keystroke Loggers
A type of software or hardware designed to record and monitor the keystrokes made on a computer or mobile device.
Remote access Trojan (RAT)
A type of malicious software that provides an attacker with unauthorized access and control over a compromised system. Remote access highlights the capability of these Trojans to allow attackers to control the infected system from a remote location.
Rootkit
A type of malicious software designed to conceal the presence of certain processes or programs on an operating system allowing attackers to maintain unauthorized access to a computer or network while avoiding detection
Backdoor
Prefers to a hidden or unauthorized means of accessing a computer system or software application. Back doors can be intentionally created by developers for legitimate reasons such as system maintenance but they can also be exploded by malicious actors for unauthorized access and control.