Chapter 3 - Malware Flashcards

1
Q

What is Malware?

A

Software designed to infiltrate a computer system and possibly damage it w/o the user’s knowledge or consent (basically all the bad things out there that can do harm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of Malware?

A
  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Spyware
  • Rootkits
  • Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer Virus?

A

Malicious code that runs on a machine without the user’s knowledge & infects the computer when executed (downloading something that has code in it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 10 different types of computer viruses?

A

1- Boot sector= Boot sector viruses are stored in the first sector of a hard drive & are loaded into memory upon boot up (hard to detect bc they are installed after the operating system boots up)

2- Macro= a from of code that allows Viruses to be embedded into a document & is executed when the document is opened by the user (word doc has them, they *aren’t malicious)

3- Program= Program viruses see infect an executable or application (Program viruses seek out executables or application files to infect. For example, if you went & loaded a virus & was able to install itself into ur Microsoft Word program, every time u opened up Word u’d be loading that virus again & again. And that’s why a program virus targets programs.)

4- Multipartite= Virus that combines boot & program viruses to first attach itself to the boot sector & system files before attacking other files on the computer (A multipartite virus is a combination of a boot sector type virus and a program virus. By using this combination, the virus is able to place itself in the boot sector and be loaded every time the computer boots. & by doing so, it can then install itself in a program where it can be run each & every time the computer starts up. This allows it to have a persistence & be able to be there over & over again.)

5- Encrypted =this virus is going to use a cipher to encrypt the contents of itself to avoid detection by any antivirus software.

6- Polymorphic= Advanced version of an encrypted virus that changes its code every time it is executed by altering the decryption module to avoid detection (what it’s doing is it’s trying to morph the way its code looks so that a signature-based antivirus can’t detect it anymore.)

7- Metamorphic= Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced version of polymorphic virus=Metamorphic viruses are able to rewrite themselves entirely before it attempts to infect a file. & essentially, this is an advanced version of a polymorphic virus.)

8- Stealth=When we talked about encrypted & polymorphic & metamorphic viruses, these are all examples of stealth viruses. They’re viruses that are using various different techniques to avoid detection by an antivirus software

9- Armored= Armored viruses have a layer of protection to confuse a program or person analyzing it (Again, this is another way that the virus is trying to protect itself & increase its odds of being able to spread to other users
without being detected.)

10- Hoax= is actually not a virus in the traditional sense. Instead, when we get a virus hoax, we’re trying to trick a user into infecting their own machine. This might come in the form of a message or a website that pops up. It may be that we call them on the phone & pretend that we’re from Microsoft tech support & tell them that their machine has been infected. (form of social engineering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a computer Worm

A

a worm is a piece of malicious software, (much like a virus. But it has a key difference.) A worm can replicate itself without any user interaction. If u remember when I talked about viruses, I said that a user has to install a program, or open a file, for that virus to be able to take its action. But with worms, that’s simply not the case. Worms are able to self-replicate & spread throughout ur network, W/O a user’s consent, or their action. This is bc they take advantage of security holes in operating systems & applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are signs of a computer worm?

A

So, if a worm knows that there’s some1 out there who hasn’t installed a security patch, they can take advantage of that, & use that to spread from victim to victim, across the network, & across the world. Bc of this, worms can cause disruption to ur normal network traffic, & computing activities. This is bc they’re spreading and replicating really fast. & when they do this from ur victim machine, They’re using up computing power. Its processing power, its memory, & its network traffic capability. & all of that is going to start (1) slowing down your system. In some cases, this can even cause your (2) system to crash.

Worms are known for spreading far and wide over the Internet, in a very short amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Trojans Horse?

A

Malicious software that is disguised as a piece of harmless or desirable software
(Basically, a Trojan says, I’m going to perform this function for u. & it will perform that desired function, but it will also perform a malicious one, too.)

▪ Trojans perform desired functions and malicious functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RAT stand for and mean?

A

Remote Access Trojan (RAT) Provides the attacker with remote control of a victim computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most commonly used type of Trojan?

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Summary of all Malware?

A

1- Virus
▪ Code that infects a computer when a file is opened or executed

2- Worm
▪ Acts like a virus but can self-replicate

3- Trojan
▪ Appears to do a desired function but also does something malicious

4- Ransomware
▪ Takes control of your computer or data unless you pay

5- Spyware
▪ Software that collects your information without your consent

5- Rootkit
▪ Gains administrative control of your system by targeting boot loader or kernel

6- Spam
▪ Abuse of electronic messaging systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Ransomware?

A

Ransomware is a type of malware that restricts access to a victim’s computer or their files until a ransom is received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does ransomware work?

A

Ransomware uses a vulnerability in ur software to gain access & then encrypts your files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spyware?

A

spyware is a type of malicious software that’s installed on your system and gathers information about you without your consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Spyware do? & what could it contain?

A

What it does is it starts looking through all of your files, ur emails, ur instant messages, ur calendar invites, & whatever other information u might have on ur system, & it gathers that all up & builds a profile on u, that’s the best case.

In the worst case, it may include a keylogger, too. Now, with a keylogger, this is going to allow that program to capture any keystrokes you make on a victim machine. So if u’re typing in a website name and ur username & ur password, it can collect that & send it back to the attacker.
It even has the ability to take screenshots of what u’re seeing on the screen, & send that back at routine intervals through email or instant message. Keyloggers are very dangerous to your security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Adware

A

Adware is a specific type of spyware

where it’s going to display advertisements to u, based on what it saw when it spied on u. So if it looked through ur emails & ur websites & ur cookies & ur browser history, it could start figuring out maybe that u’re interested in weddings. & advertise weddings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Grayware?

A

Grayware(jokeware) is a type of Spyware

It isn’t really good & it isn’t really bad, it’s kind of in the middle. Grayware is some kind of software that’s usually used to make something behave improperly w/o any serious consequences. For example, there’s one called Crazy Mouse, that if u start this program on ur friend’s computer, the mouse will start jumping over the screen. & so, if u’re trying to click on ur My Computer icon in the upper left, the mouse will jump down to the lower right corner & not click on My Computer.

17
Q

What is a Rootkit?

A

A rootkit is a specific type of software that’s designed to gain administrative level(Highest level permissions that someone can have in a given computer system/ ROOT PERIMISSIONS) control over a given computer system without being detected.

18
Q

_______ are activated before booting the operating system and are difficult to detect

A

Rootkit

19
Q

What technique is used by Rootkit that allows them to maintain persistent control?

A

DLL Injections &/or Driver Manipulations

remember that either a DLL injection or a driver manipulation have to do with rootkits.

=Both DLL injection & driver manipulation occur by the use of a shim. A shim= is simply a piece of software code that is placed between two components, & that intercepts the calls & redirects them. So, the rootkit will allow an interception to happen between the Windows OS & the Dynamic Link Library, & then redirect that call w/ the malicious code embedded into it.

20
Q

What happens with DLL Injections?

A

With a DLL injection, what ends up happening is malicious code is inserted into a running process on a Windows machine by taking advantage of the DLLs, or Dynamic Link Libraries, that are loaded at runtime. This means that the Windows system doesn’t even understand the fact that it has a rootkit installed.

21
Q

What is Driver Manipulation?

A

This is an attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level.

22
Q

How to detect Rootkits?

A

To detect them, the best way is to boot from an external device and then scan the internal hard drive to ensure that you detect those rootkits.

23
Q

What is Spam?

A

Spam is simply the abuse of the electronic messaging systems. Things like email, texting, social media, broadcast media, and even instant messaging. Most commonly though, we see this w/ email.

24
Q

How do Spammers exploit a company’s open mail relay?

A

They figured out that they can exploit other organization’s email servers & use those to send their messages. The way this works, is that there’s a thing called an open mail relay. What this means is that every organization who’s out there & has an email server, they have the ability to send mail out. They also have the ability to act as a relay & send mail on the behalf of other email organizations. So if your organization hasn’t properly secured your own mail relays, spammers can send mail through your mail servers out to other people.

25
Q

What is another variation of SPAM?

A

SPIM is Spam over Instant Messaging. SPIM is the abuse of instant messaging systems. It works just like spam, except it’s going to abuse things like your text messages, your Facebook chat, chatrooms inside games, and other things like that. This messaging is also known as IM spam.

26
Q

What is user action?

A

user action= when you downloaded it, it is called user action