Chapter 9: Malware, Vulnerability, and Threats Flashcards
Spyware
Gathers and sends off your information without your consent
-It almost always exists for the purposes of commercial gain
Adware
Malware that shows you ads to generate revenue for the creator
Rootkits
Programs that can hide from the operating system
- It can hide anywhere with enough memory in which to reside, even video cards and PCI cards
- The best defense is not to download one!
Viewing Processes in Linux
<b>ps -ef | more</b>
-<b>man</b> will generally be able to give you definitions for processes
<b>ps -u root</b> will show you which processes are being used by root
Trojan Horses
Enters the system under the guise of a different program
- They can exist on a system for YEARS before they do anything
- A port scan may reveal them
- A trojan is not always a virus, but a virus CAN be a trojan by definition (a companion virus)
Common file extensions associated with viruses
.bat .com .exe .hlp .pif .scr They may also be hidden PDF documents, zip documents, and Microsoft Office documents due to Office's extensibility and poor security.
Logic Bombs
A program set to attack when a specific event occurs. This can be when a date is reached or when a certain combination of programs is run.
Backdoor
A program that creates an entrance for an attacker
-Back Orifice and NetBus were popular backdoor creators which are now blocked by most antivirus software.
Botnets
A network of zombie computers used by a bot hoarder to combine processing power to do something malicious, often a DDoS. Windows 10 has established an extremely large botnet run by Microsoft for the purpose of decreasing server load while delivering updates and who knows what else.
Ransomware
Your files get encrypted or a password gets changed and you’re asked to pay a ransom (in Bitcoin) to get it back. Cryptolocker is one I used to struggle with fixing on client machines.
Polymorphic Virus
Changes form to avoid detection. Usually encrypts parts of its data, decrypts, and encrypts another part, etc.
Stealth Virus
Mask themselves from applications to avoid detection. Generally hide next to the boot sector
Retrovirus
Attacks or bypasses your antivirus
Multipartite Virus
Maliciously attacks in a plethora of ways
Armored Virus
Difficult to detect, analyze, or rid yourself of.