1.2 Malware Types Flashcards
This type of virus never actually gets installed and generally runs in your PCs memory. This makes it good at avoiding antivirus detection.
Fileless Virus
What is MaaS?
Malware as a service
What are two keylogger examples?
PAL Logger Pro
KeyGhost
Password attack that involves a pre-built set of hashes that are generally different for each hashing method. This saves lots of time and storage space as it uses pre-calculated hash chains to increase probability of getting a match.
Rainbow Tables
This type of malware masquerades as a real program or embeds itself into a real program in order to install backdoors or deliver a payload.
Trojan
This type of malware involves the encryption of data files where which the attacker must be paid an ransom in order to receive the decryption key.
Cryptomalware / Ransomware
This type of virus executes before the OS is even loaded on a PC.
Boot Sector Virus
What kinds of issues can a worm cause on a target computer?
Consume Resources
Access Data
Waste CPU Cycles
This type of program is often spyware or adware that can be easily caught and removed using programs like Malwarebytes. These programs can sometimes also be benign.
Potentially Unwanted Program (PUP)
What is it called when you add random data to a password when it is hashed to prevent rainbow tables from cracking the password later?
Adding Salt
Some apps store passwords in the clear/unencrypted. This type of password attack exploits these passwords.
Plaintext Password Attack
What attack type is used against AI in order to fool AI trained to detect spam in its training data? This often results in the AI revealing data that would otherwise be confidential like SSNs.
Evasion Attacks
What are 3 examples of a RAT?
Ghost
PlugX
Sakula
What is the name for an artifact left behind by malware after carrying out an attack?
Indicator of compromise (IOC)
This type of password attack involves the attacker using common passwords to try and log into an account. If they are unsuccessful they move on to the next account before the account gets locked out, preventing suspicion and alarms.
Spraying attack
In a group of 23 people, what is the probability that two share the same birthday? For a class of 30?
50% and 70%
This type of malware can gather data, display ads embedded with malware (malvertisements), and can often be found in P2P and bittorrent networks, and have the ability to infect smart devices as well.
Spyware and Adware
How can an attacker confuse artificial intelligence and cause it to behave incorrectly?
Poisong the training data used for machine learning