2.3 Malware Detection, Removal and Prevention Flashcards
Define social engineering
Any attempt to manipulate users to reveal confidential information or perform actions detrimental to a system’s security
Phishing
A social engineering attack where the malicious actor communicates with he victim from a supposedly reputable source to lure the victim into divulging sensitive information
What can the response rate be up to for generic phishing campaigns?
60-70% (with good grammar)
30-40% (with bad grammar)
Spearphishing
A more targeted version of phishing using mainly the same techniques
Whaling
Focused on key executives within an organisation or other key leaders, executives and managers in the company
What is the most effective form of phishing in a pentest?
Whaling
Smishing
Phishing over SMS
Vishing
Message being communicated to the target using the voice functions of a telephone
BEC
An attacker takes over or impersonates a high-level executive’s email account
Pharming
Tricking users into divulging private information by redirecting a victim to a website controlled by the attacker or pentester
How can attackers execute pharming?
Redirects, popups, URL masking, background processes
Malware
Software that is designed to infiltrate and damage a system
Boot sector virus
Viruses stored in the first sector of a hard drive and loaded into memory upon boot
Macro (virus)
Virus embedded into a document and executed when the document is opened
Why is it called a macro?
Because it is written in the same macro language used to create software programs (e.g. Excel, Word)
Program virus
Viruses that seek out executables or applications to infect
When are program viruses launched?
When the program is installed or executed.
Name three ways program viruses can infect a computer.
CD, removable media, email
Multipartite
A virus that combines boot and program viruses to attach to boot sector and system files before attacking other files on the computer
How do multipartite viruses propagate?
Through compromised files, downloads, or bootable media
Self-encryption
When a virus uses a cipher to encrypt its contents and avoid detection by AV software
Polymorphic
Advanced encrypted virus that changes the code after every infection, varying encryption keys to avoid detection