Chapter 3: Attacks Using Malware Flashcards
Network connected hardware devices
Endpoints
Malicious software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and harmful action
Malware
5 ways of classifying malware include …
- Imprison
- Launch
- Snoop
- Deceive
- Evade
A type of malware attack which attempts to take away the freedom of the user to do what they want on their computer
Imprison
A type of malware that prevents a user’s endpoint device from properly and fully functioning until a fee is paid
Ransomware
A type of malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid
Cryptomalware
A type of malware attack that infects a computer to launch attacks on other computers
Launch
A type of malware attached to a file
File-based virus
A type of malware which takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks
Fileless virus (Living-off-the-land binaries/LOLBins)
5 qualities of fileless viruses include …
- Easy to infect
- Extensive control
- Persistent
- Difficult to detect
- Difficult to defend
A type of malware which uses a computer network to replicate to other endpoints
Worm
A type of launch attack where an infected computer is placed under the remote control of an attacker for the purpose of launching attacks
Bot
A structure that sends instructions to infected bot computers
Command and control (C&C)
A type of malware that is deployed without the consent or control of the user
Spyware
Hardware or software that silently captures and stores each keystroke that a user types on a keyboard
Keylogger
Software that users do not want on their computer
Potentially unwanted program (PUP)
An executable program that masquerades as performing a benign activity but also does something malicious
Trojan
Malware that infects a computer like a Trojan but also gives the threat agent unauthorized access to the victim’s computer by using specially configured communication protocols
Remote Access Trojan (RAT)
Malware that gives access to a computer, program, or service that circumvents any normal security protections
Backdoor