1.2 Malware Types Flashcards

1
Q

This type of virus never actually gets installed and generally runs in your PCs memory. This makes it good at avoiding antivirus detection.

A

Fileless Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MaaS?

A

Malware as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two keylogger examples?

A

PAL Logger Pro
KeyGhost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Password attack that involves a pre-built set of hashes that are generally different for each hashing method. This saves lots of time and storage space as it uses pre-calculated hash chains to increase probability of getting a match.

A

Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of malware masquerades as a real program or embeds itself into a real program in order to install backdoors or deliver a payload.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of malware involves the encryption of data files where which the attacker must be paid an ransom in order to receive the decryption key.

A

Cryptomalware / Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of virus executes before the OS is even loaded on a PC.

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kinds of issues can a worm cause on a target computer?

A

Consume Resources
Access Data
Waste CPU Cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of program is often spyware or adware that can be easily caught and removed using programs like Malwarebytes. These programs can sometimes also be benign.

A

Potentially Unwanted Program (PUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called when you add random data to a password when it is hashed to prevent rainbow tables from cracking the password later?

A

Adding Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some apps store passwords in the clear/unencrypted. This type of password attack exploits these passwords.

A

Plaintext Password Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What attack type is used against AI in order to fool AI trained to detect spam in its training data? This often results in the AI revealing data that would otherwise be confidential like SSNs.

A

Evasion Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 examples of a RAT?

A

Ghost
PlugX
Sakula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name for an artifact left behind by malware after carrying out an attack?

A

Indicator of compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of password attack involves the attacker using common passwords to try and log into an account. If they are unsuccessful they move on to the next account before the account gets locked out, preventing suspicion and alarms.

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a group of 23 people, what is the probability that two share the same birthday? For a class of 30?

A

50% and 70%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This type of malware can gather data, display ads embedded with malware (malvertisements), and can often be found in P2P and bittorrent networks, and have the ability to infect smart devices as well.

A

Spyware and Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can an attacker confuse artificial intelligence and cause it to behave incorrectly?

A

Poisong the training data used for machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This type of password attack uses common dictionary words in order to crack passwords. The exploits the fact that passwords are created by humans and we use words for our passwords. This takes a lot of time and processing power. Useless against random character passwords.

A

Dictionary attacks

20
Q

What are the benefits and drawbacks to On-premesis security?

A

Benefits:

  • Customize your own security posture
  • On-site IT can manage security, uptime, and availability

Drawbacks:

  • Local teams can be expensive and difficult to staff
  • Security changes can take time
21
Q

What kinds of programs can a Trojan imitate?

A

Games
Utilities
Drivers/Patches/Updates
System upgrades
Freeware

22
Q

These types of packages are generally pre-built ransomware packages that can be purchased on the Dark web for a fee

A

Ransomware as a service

23
Q

This type of malware creates backdoors on target systems allowing an attacker to gain access to a system remotely through a C2 server in order to steal data or control said system.

A

Remote Access Trojan (RAT)

24
Q

This type of malware is self-replicating, requiring no human input in order to spread.

A

Worm

25
Q

This type of virus is OS, browser, or macro based and can use programs like powershell, command prompt, or MS Word to execute.

A

Script Virus

26
Q

What are the 5 campaign steps to a ransomware attack?

A

Install malware
Contact C&C server
Handshake
Encryption
Extortion

27
Q

This type of malware is used to log keystrokes and report them to a C2 server. Can be used maliciously or in a benign sense to track employees or family members.

A

Keylogger

28
Q

What are the best methods for protecting against a ransomware attack?

A

Keep an offline backup

Keep OS and apps up to date

Keep AV signatures up to date

29
Q

What are the two main ways to prevent your PC from becoming a bot?

A

Prevent initial infection

Prevent C&C communication if infected

30
Q

What type of attack involves the attacker receiving an encrypted peice of data and then using cryptography to crack the encryption?

A

Cryptographic

31
Q

What are some real-world examples of worms?

A

Sasser
ILOVEYOU
Conficker
Stuxnet

32
Q

The name for an instance when two different plaintext values share the same hash.

A

Collision

33
Q

This type of attack involves stealing credit card info at the point of sale via false card readers and cameras to capture PIN numbers.

A

Skimming

34
Q
A
35
Q

This type of attack is only executed during a predefined event or if a particular set of paramaters are met (i.e. a major event, a number of mouse clicks, a particular time of day, etc.)

A

Logic Bomb

36
Q

This password attack involves simply trying all combinations until the required hash is met.

A

Brute Force

37
Q

What platform has recently become a target for RATs?

A

Mobile Devices

38
Q

This type of attack forces a target system to revert back to a lower level of encryption and security that may have more vulnerabilities. i.e. Downgrading from TLS to SSL 3.0

A

Downgrade attack

39
Q

What makes a USB cable malicious?

A

Has additional electronics inside that can deliver a payload

40
Q

What program is coined as the first form of ransomware introduced in 2005?

A

Gpcoder

41
Q

A group of infected computers working together and often reporting back to a C&C server to perform things like DDoS attacks, relay spam attacks, and distributed computing tasks like bitcoin mining.

A

Botnet

42
Q

What are the benefits and drawbacks to cloud security?

A

Benefits:

  • Data is in a secure environment
  • Cloud providers manage large-scale security
  • Low downtime
  • Scalable security options

Drawbacks:

  • Third party data access
  • Users must follow best practices
  • Not as customizable
43
Q

Can a Trojan replicate itself?

A

No

44
Q

The general term for malware that can reproduce itself.

A

Virus

45
Q

This type of attack involves an attacker infecting a third party vendor, supplier, manufacturer, etc. which in turn is able to infect all entities which the third pary has ties with, eventually infecting the entire chain.

A

Supply Chain Attack

46
Q

This type of attack involves files and folders being encrypted and held for ransom with payments generally requested in crypto currency.

A

Ransomware

47
Q

What do you call a system that has been infected with malware (often in the background) that waits for instructions from a main C&C server?

A

Bot