Chapter 6 - Malware Flashcards

1
Q

Threat Vector

A

Vulnerabilities that COULD be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

The way vulnerabilities WILL BE/WERE exploited (it’s a sequence of event)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot Sector Virus

A

Virus that boots up with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Marco (Virus)

A

performs a set of actions; it’s embedded in the document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Program Virus

A

looks for app files to attach to the app code, so that it opens up each time with the app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multipartite Virus

A

With each system boot it looks for a program to attached itself to its code; can re-install itself with every boot
(BOOT+PROGRAM VIRUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypted Virus

A

Virus of which malicious code is deciphered making it harder to find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Polymorphic Virus

A

Its code changes with each execution (instead of encrypting itself, its code changes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Metamorphic Virus

A

More advanced polymorphic virus; rewrites the entire code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stealth Virus

A

It’s a technique virus uses so it’s prevented from detection (e.g. encrypted virus, poly/metamorphic virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Armored Virus

A

focus on making analysis difficult for researchers and security programs (obfuscation techniques like encryption, compression, and code packing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hoax

A

It’s a social engineering technique meant to scare people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

Oppositely to a virus it can replicate itself without human intervention (application) and spreads far and wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

Disguised software that has malicious code along with the regular app of the code (is a virus APART from performing the expected tasks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

R.A.T

A

Remote Access Trojan - provides attacker with the remote access of victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the methods to protect from ransomware?

A

1) Backups
2) Regular Updates
3) Staff training
4) MFA

17
Q

How to act in an event of ransomware attack?

A

1) NEVER PAY
2) Disconnect from network
3) Notify authorities (unless the policy states otherwise)
4) Restore the backup

18
Q

Zombie

A

A part of the BOTNET; it’s a compromised device

19
Q

Botnet

A

A network of compromised devices (Zombies); controlled remotely

20
Q

Command and Control Node (C-2 Node)

A

A device controlling the Botnet

21
Q

What are Botnets used for?

A

1) Storing illegal content on victim’s machines (zombie devices)
2) Pivot points (enables lateral movement; acts a a middleman; data exfiltrated through a zombie) e.g. spreading through IoT devices through the network
3) Disguise in the events of attacks
4) Coin mining
5) Using the computing power to break encryption
6) DDoS (Mirai Botnet)

*often only 20-25% of computing power is used not to alarm the users

22
Q

Rootkit

A

A software designed to gain admin level of permission (going from Ring 3 to Ring 0)

23
Q

Kernel Mode

A

Operating in the “Ring 0” - highest permission level allowing access to drivers, sound cards, video displays etc.

24
Q

Shim

A

Piece of software placed in between network components; shim can intercept and alter system behaviors like hiding files or bypassing security controls

25
Q

Backdoor

A

Way to directly access the “inside” of the code/system; RAT works this way. If done on purpose it’s dumb

26
Q

Logic Bomb

A

A piece of malicious code activated only in a certain condition; (worker placing a data extraction code in case he gets fired)

27
Q

Keyloger

A

Software recording the keystrokes

28
Q

Spyware

A

Software gathering and sending the data to the attacker // to prevent - antivirus+anti-spyware

29
Q

Bloatware

A

A piece of software you didn’t ask for (marketing purposes); pre-installed or added in other downloads // malicious for its memory usage or possibility of having vulnerabilities

30
Q

Dropper

A

Acts as a normal program but in fact initiates other malware

31
Q

Downloader

A

Retrieves tools post DROPPER infection

32
Q

Shellcode

A

A lightweight piece of code meant to execute an exploit

33
Q

Concealment

A

Hiding evidence of an attack/exploit to prolong it

34
Q

9 Indicators of Malware Attacks:

A

1) Account Lockouts (after several brute force attempts)
2) Concurrent Session Utilization (simultaneous sessions on one account)
3) Blocked Content
4) Impossible Travel (account logged in the US and an hour later in Poland)
5) Resource Consumption (spikes in CPU, memory or network usage)
6) Resource Inaccessibility
7) Out-of-Cycle Logging
8) Missing Logs (attackers trying to hide their tracks)
9) Published or Documented Attacks (you find out on a website about a leakage)