2.3 - Malware Flashcards

1
Q

Malware

A
  • Malicious software - These can be very bad
  • Gather information - Keystrokes
  • Participate in a group - Controlled over the ‘net
  • Show you advertising - Big money
  • Viruses and worms
    – Encrypt your data and ruin your day
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware types and methods

A
  • Trojan Horse
  • Rootkit
  • Viruses
  • Spyware
  • Ransomware
  • Keylogger
  • Boot sector virus
  • Cryptominers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How you get malware

A
  • These all work together
    – Malicious software takes advantage of a vulnerability
    – Installs malware that includes a remote access backdoor
    – Bot may be installed later
  • Your computer must run a program
    – Email link - Don’t click links
    – Web page pop-up
    – Drive-by download
    – Worm
  • Your computer is vulnerable
    – Operating system - Keep your OS updated!
    – Applications - Check with the publisher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A
  • Used by the Greeks to capture Troy from the Trojans
    – A digital wooden horse
  • Software that pretends to be something else
    – So it can conquer your computer
    – Doesn’t really care much about replicating
  • Circumvents your existing security
    – Anti-virus may catch it when it runs
    – The better Trojans are built to avoid and disable AV
  • Once it’s inside it has free reign
    – And it may open the gates for other programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkits

A
  • Originally a Unix technique
    – The “root” in rootkit
  • Modifies core system files
    – Part of the kernel
  • Can be invisible to the operating system
    – Won’t see it in Task Manager
  • Also invisible to traditional anti-virus utilities
    – If you can’t see it, you can’t stop it
    – Finding and removing rootkits
  • Look for the unusual
    – Anti-malware scans
  • Use a remover specific to the rootkit
    – Usually built after the rootkit is discovered
  • Secure boot with UEFI
    – Security in the BIOS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus

A
  • Malware that can reproduce itself
    – It needs you to execute a program
  • Reproduces through file systems or the network
    – Just running a program can spread a virus
  • May or may not cause problems
    – Some viruses are invisible, some are annoying
  • Anti-virus is very common
    – Thousands of new viruses every week
    – Is your signature file updated?
    – Boot sector virus
  • Most viruses run after the OS is loaded
    – Like most applications
  • Some boot loaders can be modified to run malware
    – Runs every time you start your computer
  • Modern UEFI BIOS includes Secure Boot
    – Prevent unsigned software from running during the
    boot process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware

A
  • Malware that spies on you
    – Advertising, identity theft, affiliate fraud
  • Can trick you into installing
    – Peer to peer, fake security software
  • Browser monitoring - Capture surfing habits
  • Keyloggers
    – Capture every keystroke
    – Send it back to the mother ship
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keyloggers

A
  • Your keystrokes contain valuable information
    – Web site login URLs, passwords, email messages
  • Save all of your input
    – Send it to the bad guys
  • Circumvents encryption protections
    – Your keystrokes are in the clear
  • Other data logging
    – Clipboard logging, screen logging,
    instant messaging, search engine queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A
  • A particularly nasty malware
    – Your data is unavailable until you provide cash
  • Malware encrypts your data files
    – Pictures, documents, music, movies, etc.
    – Your OS remains available
    – They want you running, but not working
  • You must pay the bad guys to obtain the decryption key
    – Untraceable payment system
    – An unfortunate use of public-key cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptominers

A
  • Some cryptocurrency mining requires “proof of work”
    – Usually consists of a difficult math problem
    – Answer the problem and earn some currency
  • This requires extensive CPU processing
    – One CPU isn’t enough
    – Attackers want to use your CPU
  • May appear in different ways
    – Visit a website and CPU utilization spikes
    – Malware is installed and mining is always occurring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly