3. Malicious Code Flashcards
Ransomware
Malware that takes over a computer and then demands a ransom.
Trojans/Trojan Horses
Type of Malware that is typically disguised as legitimate software.
RATs
Remote Access Trojans.
Designed to provide attackers with remote access and monitoring to systems.
Worms
Worms spread themselves. Worms self-install rather than requiring users to click on them.
Rootkits
Malware that is specifically designed to allow attackers to access a system through a backdoor. Rootkit detection can be challenging,
Backdoors
Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers to access systems, devices, or applications.
Bots
Remotely controlled systems or devices that have a malware infection. A group of bots is a botnet.
C&C
Command and Control.
The core of a botnet.
Fast Flux DNS
Uses many IP addresses that are used to answer queries for one or more fully qualified DNS names.
Keyloggers
Programs that capture keystrokes from keyboards.
Logic Bombs
Functions or code that are placed inside other programs that will activate when a specific date or set of conditions is met.
Virus
Malicious programs that self-copy and self-replicate. Viruses have a trigger, which sets the conditions for when the virus will execute, and a payload, which is what the virus does.
Fileless Virus
Similar to a traditional virus, but they inject themselves into memory and conduct further malicious activity. They don’t require local file storage because they remain memory resident.
Spyware
Malware that is designed to obtain information about an individual, organization, or system.
PUPs
Definition & Examples
Potentially Unwanted Programs
Programs that may not be wanted by the user but are not as dangerous as other malware.
Examples: Adware, Browser Toolbars, Web Browser-Tracking programs.