1.2 Malware & common attacks Flashcards
What is a malware?
malicious software, can aim at gather information or take control of your computer and make it a botnet
What are the different type of malware?
- viruses
- crypto-malware
- worms
- trojan horse
- rootkit
- keylogger
- adware/spyware
- botnet
How to get a malware?
can be dl via a click on an email, or via web page pop up, or via a vunerability
What is a virus?
a malware that can reproduce itself through file systems or network
What is the different virus type ?
- program viruses (in applications)
- boot sector viruses (when the OS boot)
- script viruses
- macro viruses (inside a macro in microsoft office)
- fileless virus
What is a fileless virus?
type of malware that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, making it hard to detect.
How fileless malware work?
1/user click on malicious website link
2/ website exploit a vulnerability
3/ launch powershell and dl payloads in RAM
4/ run powershell script and exec in memory
What is a worm?
type of malware that self replicated and self spread through a network
How a worm can be detected?
by a firewalls and IDS/IPS before the infection, the worm should be signature based
What is a ransomware?
malware that employs encryption to hold a victim’s information at ransom
What is crypto malware?
same as ransomware, the data are encrypted and the ransom needs to be paid if you want the data back
How to protect against ransomware
- have a backup
- update OS
- update apps
- update antivirus/malware to get the latest signature
what is trojan horse?
software that pretend to be something else and in reality you are installing a malware, once it is inside in can open backdoor or dl file etc
what is a PUP
Potentially Uwanted Software that can be dl by a trojan (eg agressive browser toolbar, unwanted ad etc)
what is a backdoor?
can be open thans to a malware. It is a undocumented way of gaining access to a computer without having to redo the whole attack for the hacker. SOme software like Linux includ backdoor to the kernel