3. Malicious code Flashcards
What are the different types of malware?
Malware includes:
* Ransomware
* Trojans
* Worms
* Spyware
* Bloatware
* Viruses
* Keyloggers
* Logic bombs
* Rootkits
Each type has distinctive elements that security analysts need to understand.
What do security analysts need to know about malware?
Security analysts need to know:
* What identifies each type of malware
* How to identify it
* Common controls deployed against it
* What to do if encountered
Knowledge of these aspects is crucial for effective malware management.
What are common indicators of compromise (IoCs) associated with malware?
Common IoCs include:
* Command and control (C&C) traffic patterns
* IP addresses
* Hostnames
* Domains
* Unexpected use of system utilities
* Lateral movement between systems
* Creation of files and directories
* Encryption of files
* Data exfiltration
These indicators vary based on the type of malware.
True or False: Signatures for malware are used to identify specific files associated with given malware packages.
True
However, malware writers use defensive techniques to make identification harder.
What methods can be used to mitigate malware?
Methods include:
* Manual removal
* Use of tools to identify and remove malicious files
* Reinstallation of a system
* Restoration from a known good backup
These methods ensure all malware is removed and systems are secure.
Fill in the blank: Indicators of compromise associated with malware vary based on the type of malware and how it is _______.
[designed and used]
Understanding the design and usage is key to identifying IoCs.