Chapter 11 Flashcards
Malicious software (malware)
Any program that carries out actions that you do not intend
types of viruses (3)
System infectors
File infectors
Data infectors
System infectors
Target computer hardware and software startup functions
File infectors
Attack and modify executable programs (COM, EXE, SYS, and DLL files in Microsoft Windows)
Data infectors
(Also called macro infectors) Attack document files containing embedded macro programming capabilities
Other virus classifications (6)
Polymorphic viruses Stealth viruses Slow viruses Retro viruses Cross-platform viruses Multipartite viruses
Polymorphic viruses:
These include a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus. The virus exposes only the decryption routine for possible detection. It embeds the control portion of the virus in the decryption routine, which seizes control of the target system and decrypts the main body of the virus so that it can execute. True polymorphic viruses use an additional mutation engine to vary the decryption process for each iteration. This makes even this portion of the code more difficult to identify.
Stealth viruses:
Also called armored viruses, these use a number of techniques to conceal themselves from users and from detection software. By installing a low-level system service function, they can intercept any system request and alter the service output to conceal their presence. Stealth viruses can have size stealth, read stealth, or both.
Slow viruses:
These counter the ability of antivirus programs to detect changes in infected files. This class of virus resides in the computer’s memory, where antivirus software cannot detect it. It waits for certain tasks, like copying or moving files, to execute. As the operating system reads the file into memory, the virus alters it before writing to the output file, making it much harder to detect.
Retro viruses:
Retro viruses: These attack countermeasures such as antivirus signature files or integrity databases. A retro virus searches for these data files and deletes or alters them, thereby crippling the antivirus software’s ability to function. Other viruses, especially boot viruses (which gain control of the target system at startup), modify Windows Registry keys and other operating system key startup files to disable AV, firewall, and intrusion detection system (IDS) software if found.
Multipartite viruses:
Cross-platform viruses:
These are less prevalent but can still be potent threats. There have been a number of documented viruses that target multiple operating systems (Apple Macintosh HyperCard viruses, for instance). If those platforms also run Windows emulation software, they become as susceptible to Windows viruses as a native Windows computer.
Multipartite viruses:
These are hybrid viruses that exhibit multiple behaviors. There are two main types of multipartite virus: Master Boot Record/boot sector viruses and file infecting viruses. Such viruses may exist as file infectors within an application. Upon execution of the infected application, the virus might spawn a Master Boot Record infection, which then infects other files when you restart the system.
Rootkits
- Type of malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised
- Modify parts of the operating system to conceal traces of their presence
- Provide attackers with access to compromised computers and easy access to launching additional attacks
- Difficult to detect and remove
Ransomware
- Attempts to generate funds directly from a computer user
- Attacks a computer and limits the user’s ability to access the computer’s data
- Encrypts important files or even the entire disk and makes them inaccessible
- One of the first ransomware programs was Crypt0L0cker
Spam
Consumes computing resources bandwidth and CPU time
Diverts IT personnel from activities more critical to network security
Is a potential carrier of malicious code
Compromises intermediate systems to facilitate remailing services
Opt-out (unsubscribe) features in spam messages can represent a new form of reconnaissance attack to acquire legitimate target addresses
Worms
Designed to propagate from one host machine to another using the host’s own network communications protocols
Unlike viruses, do not require a host program to survive and replicate
The term “worm” stems from the fact that worms are programs with segments, working on different computers, all communicating over a network
Trojan Horses
Largest class of malware
Any program that masquerades as a useful program while hiding its malicious intent
Relies on social engineering to spread and operate
Spreads through email messages, website downloads, social networking sites, and automated distribution agents (bots)