1.2 Potential Indicators - Attack Type Flashcards
Threats, Attacks, and Vulnerabilities: Given a Scenario, Analyze Potential Indicators to determine the type of attack
1
Q
Malware - Virus
A
- A malicious computer program that requires user intervention (ex: clicking it or copying it to a media or host) within the affected system
- Most viruses self-replicate without the knowledge of the computer user.
- Can be passed along from one system to another (via email, IM, downloads, removable media, network connections)
- Probably the most common and prevalent type of system attack.
- Often tedious to repair or clean up. Sometimes can be fatal to the entire computer system and company operations.
2
Q
Boot Sector Virus
A
- Infect the boot sector or partition table of a disk.
- Boot sector is used by the computer to determine which OS are present on the system to boot.
- Most common way a boot sector virus finds its way into a system is through an infect disk or removable media device that is inserted into the computer.
3
Q
Boot Sector Virus
A
- Doesn’t allow computer to boot, rendering computer useless.
- Infect the boot sector or partition table of a disk.
- Boot sector is used by the computer to determine which OS are present on the system to boot.
- Most common way a boot sector virus finds its way into a system is through an infect disk or removable media device that is inserted into the computer.
- Best way to remove - is to boot the system using an anti virus or similar emergency recovering media
- This allows you to start up the computer with basic start - up files, bypassing the boot sector and then run the antivirus program on the recovery media.
4
Q
Companion virus
A
- Disguises itself as a legitimate program, using the name of a legit program but with a different extension.
- Typically it will also execute the legitimate program after installing the virus code so that the system appears to be performing normally.
- Some viruses replace the original file with their version that performs the same tasks but includes new malicious code to run with it.
5
Q
File Infector Viruses
A
- Generally infect files that have the extension .com or .exe
- Can be extremely destructive b/c they try to replicate and spread further by infecting other executable programs.
- Sometimes it destroys the original program by overwriting the original code.
- Caution: If your computer is afflicted with a file infector virus, DO NOT attach it to a network b/c it could infect files on other workstations and file servers.
6
Q
Macro Virus
A
- A macro is an instruction that carries out program commands automatically within an application.
- Typically used with Word and Excel.
- Uses the internal workings of the application to perform malicious operations
7
Q
Trojan Horse
A
- Software that pretends to be something else so it can conquer your computer
- Doesn’t really care about replicating
- Circumvents existing security
- Designed to look non-threatening to users and anti-virus software
- Some even disable Anti Virus
- Can configure backdoors or configure additional malware
8
Q
PUP
A
- Potentially Unwanted Program
- Could be undesirable, may not be malicious, may cause performance issue
- Might install a browswer toolbar that’s difficult to uninstall
- or a backup utility that always shows or hijacks browswer
9
Q
Backdoors
A
- Malware tends to open a backdoor on system
- Malware creates a new way to access system
- Sometimes the same backdoor is open other malware can potentially use it
- Difficult to find vulnerabilities and get users to click on links.
- Wants to find a way to easily access your system again (without having to make you click on something etc.)
- Ex: Old version of linux included a backdoor
10
Q
RAT
A
- Remote Access Trojan (or Remote Administration Tool)
- Ultimate backdoor
- Administrative control of a device
- Malware that is installed, might install the RAT
- Ex: can collect log of key strokes, screen shots, copy files, embed more malware
11
Q
Protecting against Trojan + RATs
A
- Similar to preventing other malware
- Don’t run unknown software
- Keep anti virus / malware up to date
- Have latest signature installs for software
- Have a backup so you can restore from known good backup
12
Q
Rootkit
A
- Foundation in Unix/Linux, but they can be found on any OS
- Common characteristic: instead of modifying files in OS, it modifies files in kernel (foundational building blocks of OS) everything that runs in OS runs on top of Kernel
- B/c malware becomes part of OS itself, it becomes invisivble to anti virus / malware
- Identifying and removing from rootkit is very difficult
13
Q
Zeus/ Zbot Malware
A
- Example of malware that combines rootkit with malware
- Very good at transferring money out of bank account and into theirs
- Combined Zeus malware with Necurs rootkit, almost impossible to delete from system
14
Q
Root kit removers
A
- Some anti virus/ malware that can identify malware on rootkits
- BIOs software example - Secure boot:
- EX: UEFI has secure boot will examine if any part of root kit has been modified and then won’t let it boot.
15
Q
Spyware
A
- More malicious than Adware, it is trying to gather information about you
- Ex: where you visit on the internet or PII
- Can be installed different ways, ex: Trojan horse, peer to peer or fake security software
- Common spyware will examine sites visiting, and examine strokes your using to get user names/ password
- Adware and spyware continue to be popular b/c users are very valuable
- Prevention: Always make sure you have the latest signatures, don’t install unverified third party software
16
Q
Adware
A
- Adware is one big advertisement, can cause performance in OS and slowdown and increased network traffic
- Sometimes it can be installed accidentally
- If you try to remove adware, you can find removal software that is also malware
17
Q
Bot
A
- Stands for robot
- Describes automation that occurs behind the scenes when this type of malware takes control of your machine
- Entry points: Trojan horse, through vulnerability in OS, or alongside a normal application installation
18
Q
Botnet
A
- When a group of bots on different machines is woking together and controlled with the C&C (Command and Control server)
- When all these systems are being controlled by a bad actor it can cause a DDoS (Distributed Denial of Service)
- Systems can act as proxies or relays for spam, network traffic and other types of tasks
- Can be rented out to 3rd parties to “rent a DDoS”
- map.lookingglass.cyber.com lists active botnets and live attacks and countries
19
Q
C&C Server
A
- Controls botnets
- ## Issues commands to bot nets
20
Q
How to stop a botnet
A
- Ensure your OS is running the latest patches
- Antivirus/malware and latestsignatures
- Can perform an on-demand network scan and look for any unusual network patterns
- Prevent C&C - If you know the patterns of the C&C can block it at the firewall or at the IPS / Firewall at the workstation level