CompTIA Sec+ SY0-701 Cyber Attacks Flashcards
Ransomware:
Description: Ransomware encrypts files or locks users out of their systems, demanding payment (usually in cryptocurrency) for decryption or access restoration. Scenario: A user downloads a file from an email attachment that appears to be a legitimate invoice. Unbeknownst to them, the attachment contains ransomware, which quickly encrypts files across their system, demanding payment for decryption keys.
Preventive Measures: Employ email and web filtering solutions to block malicious attachments and links, keep systems and software updated with security patches, and regularly back up critical data offline.
Remedial Measures: Isolate infected systems from the network to prevent further spread, restore data from backups, and use reputable ransomware decryption tools if available.
Trojan Horse:
Description: Trojans masquerade as legitimate software or files to deceive users into executing them, allowing attackers to gain unauthorized access, steal data, or install additional malware. Scenario: A user downloads a seemingly innocuous software update from a third-party website, unaware that it contains a Trojan horse designed to steal sensitive login credentials stored on their system.
Preventive Measures: Exercise caution when downloading files or software from untrusted sources, use reputable antivirus software to scan for and remove Trojans, and implement least privilege access controls.
Remedial Measures: Quarantine infected systems, scan for and remove Trojan files and associated artifacts, and conduct thorough security assessments to identify potential entry points.
Spyware:
Description: Spyware secretly monitors users' activities, collects personal information, and relays it to third parties without consent, compromising privacy and security. Scenario: A user unknowingly installs a free software application bundled with spyware onto their device. The spyware tracks their web browsing habits, captures login credentials, and sends the data to a remote server controlled by attackers.
Preventive Measures: Install reputable anti-spyware software to detect and remove spyware, avoid clicking on suspicious links or pop-up ads, and regularly review app permissions on devices.
Remedial Measures: Use anti-spyware tools to scan and remove malicious software, reset compromised account credentials, and educate users on safe internet browsing practices.
Worms:
Description: Worms are self-replicating malware that spread across networks by exploiting vulnerabilities, consuming system resources, and often carrying payloads for further malicious activities. Scenario: A vulnerable server connected to a corporate network is infected with a worm that exploits a known software vulnerability. The worm rapidly propagates across the network, disrupting services and
Preventive Measures: Keep systems and software updated with security patches, segment network traffic to contain potential worm outbreaks, and deploy intrusion detection systems (IDS) to monitor for suspicious behavior.
Remedial Measures: Isolate infected systems from the network, apply security patches to vulnerable systems, and use antivirus software to detect and remove worm components.
Adware:
Description: Adware displays unwanted advertisements, pop-ups, or redirects on users' devices, often disrupting user experience and compromising system performance. Scenario: A user downloads a free game application from an unofficial app store. Unbeknownst to them, the application contains adware that bombards the device with intrusive advertisements, slowing down system performance.
Preventive Measures: Install reputable ad-blocking extensions or software, be cautious when downloading free software from the internet, and regularly update antivirus software to detect and remove adware.
Remedial Measures: Use adware removal tools to scan and remove malicious software, reset browser settings to default, and educate users on avoiding potentially unwanted programs (PUPs).
Rootkits:
Description: Rootkits are stealthy malware that conceals malicious processes or files within the operating system, enabling unauthorized access, data theft, and system manipulation. Scenario: An attacker exploits a known vulnerability to install a rootkit on a server hosting critical business applications. The rootkit conceals its presence, allowing the attacker to maintain persistent access and exfiltrate sensitive data without detection.
Preventive Measures: Regularly update system firmware and security patches, use secure boot processes to prevent unauthorized modifications, and implement intrusion detection systems (IDS) to detect rootkit activity.
Remedial Measures: Employ rootkit detection and removal tools to scan for and eliminate malicious software, perform system re-imaging from a known good backup, and monitor for signs of system compromise.
Botnets:
Description: Botnets are networks of compromised devices, or "bots," controlled by attackers to carry out malicious activities such as distributed denial-of-service (DDoS) attacks, spam email campaigns, and information theft. Scenario: A group of internet-connected IoT devices, including smart cameras and routers, is infected with botnet malware. The devices are remotely controlled by attackers to launch a coordinated DDoS attack against a targeted website, causing service disruption.
Preventive Measures: Implement network segmentation to limit the spread of botnet infections, deploy intrusion prevention systems (IPS) to block malicious traffic, and use strong, unique passwords for device authentication.
Remedial Measures: Disconnect infected devices from the network, perform malware scans to identify and remove botnet components, and collaborate with internet service providers (ISPs) to mitigate botnet activity.
Cryptojacking:
Description: Cryptojacking involves using malware to hijack computing resources, such as CPU and GPU cycles, to mine cryptocurrency without the user's consent or knowledge. Scenario: A user visits a compromised website that secretly runs JavaScript code in the background, exploiting the device's processing power to mine cryptocurrency without the user's permission, causing system slowdowns.
Preventive Measures: Employ browser extensions or software to block cryptojacking scripts, monitor system performance for signs of unusual resource consumption, and educate users on the risks of visiting untrusted websites.
Remedial Measures: Use antivirus software to detect and remove cryptojacking malware, close browser tabs or processes consuming excessive resources, and update security patches to address known vulnerabilities.
Fileless Malware:
Description: Fileless malware resides in memory or uses legitimate system processes to execute malicious commands, making it difficult to detect using traditional antivirus solutions and bypassing file-based security measures. Scenario: An unsuspecting user clicks on a malicious link in a phishing email, triggering the execution of fileless malware that exploits a vulnerability in the web browser. The malware executes in memory, evading detection by traditional antivirus software and stealing sensitive information.
Preventive Measures: Deploy endpoint detection and response (EDR) solutions to monitor for suspicious behavior, restrict administrative privileges to reduce attack surface, and conduct regular security assessments to identify vulnerabilities.
Remedial Measures: Analyze memory dumps and system logs for signs of fileless malware activity, implement application whitelisting to prevent unauthorized code execution, and educate users on recognizing phishing attempts.
Mobile Malware:
Description: Mobile malware targets smartphones and tablets, compromising device security, stealing sensitive information, and performing unauthorized activities such as premium SMS fraud or banking credential theft. Scenario: A user downloads a seemingly harmless mobile game from a third-party app store. Unbeknownst to them, the game contains malware that exploits device vulnerabilities to steal personal information and send premium-rate SMS messages.
Preventive Measures: Download apps only from official app stores, keep operating systems and applications updated with the latest security patches, and use mobile security software to scan for and remove malware.
Remedial Measures: Reset compromised devices to factory settings to remove malware, install security updates to patch vulnerabilities, and enable remote wipe features to protect sensitive data in case of loss or theft.
Scareware:
Description: Scareware is malicious software that masquerades as legitimate security software, often displaying alarming messages or pop-ups to trick users into purchasing fake security solutions or providing personal information. Scenario: A user encounters a pop-up message claiming their computer is infected with viruses and prompts them to download a fake antivirus program. Believing the message to be genuine, the user installs the scareware, which further compromises their system.
Preventive Measures: Educate users about the tactics used by scareware, use reputable antivirus software to detect and block scareware, and avoid clicking on suspicious pop-up messages or advertisements.
Remedial Measures: Remove scareware programs using reputable antivirus or anti-malware tools, reset browser settings to default to remove malicious extensions, and review recent software installations for potentially unwanted programs.
Backdoors:
Description: Backdoors are hidden entry points in software or systems that allow unauthorized access to the system, bypassing normal authentication mechanisms. They are often used by attackers to maintain persistent access to compromised systems. Scenario: An attacker exploits a known vulnerability in a web server to install a backdoor that allows remote access to the system. The backdoor enables the attacker to upload and execute malicious code, steal sensitive data, and manipulate system settings.
Preventive Measures: Regularly update software and firmware with security patches, use strong encryption for network communication, and implement intrusion detection systems (IDS) to detect and block backdoor activity.
Remedial Measures: Close the backdoor by removing or patching the vulnerability, conduct a thorough security audit to identify potential backdoors, and implement access controls to prevent unauthorized system access.
Exploit Kits:
Description: Exploit kits are prepackaged bundles of malicious code designed to automate the exploitation of vulnerabilities in software, web browsers, and plugins. They are often distributed through compromised websites or malicious links. Scenario: A user visits a compromised website hosting an exploit kit. The kit scans the user's system for known vulnerabilities and delivers a payload tailored to exploit the detected weaknesses, leading to the installation of malware or remote access tools.
Preventive Measures: Keep software and plugins up-to-date with security patches, use web application firewalls (WAFs) to block exploit kit traffic, and regularly scan websites for vulnerabilities using security tools.
Remedial Measures: Apply security patches to vulnerable systems, remove malicious code injected by exploit kits, and implement network monitoring to detect and block exploit kit activity.
Email Phishing Attacks:
Description: Email phishing involves sending fraudulent emails that appear to be from legitimate sources, such as banks, social media platforms, or government agencies, with the intention of tricking recipients into revealing sensitive information or clicking on malicious links. Scenario: An employee receives an email purportedly from their company's IT department, requesting them to reset their account password by clicking on a link provided in the email. The link leads to a phishing website designed to steal the user's login credentials.
Prevention/Remediation:
Educate users about the characteristics of phishing emails, such as generic greetings, urgent language, and suspicious sender addresses.
Implement email filtering solutions to detect and block phishing emails before they reach users’ inboxes.
Encourage users to verify the authenticity of emails by contacting the purported sender through official channels.
Spear Phishing Attacks:
Description: Spear phishing attacks are targeted phishing campaigns that tailor messages to specific individuals or organizations, often using personal information obtained from social media or other sources to increase credibility. Scenario: A senior executive receives an email purportedly from a trusted business partner, requesting urgent payment for an invoice. The email contains accurate details about the company's ongoing projects, making it appear legitimate. However, the request is fraudulent, and the payment would go to the attacker's account.
Prevention/Remediation:
Implement strict access controls to limit the exposure of personal and organizational information.
Train employees to be cautious about sharing personal information online and to recognize suspicious requests for sensitive data.
Utilize email authentication protocols such as SPF, DKIM, and DMARC to verify the authenticity of email senders.
Vishing (Voice Phishing) Attacks:
Description: Vishing attacks involve using voice communication, such as phone calls or voicemail messages, to trick individuals into divulging sensitive information or performing specific actions. Scenario: A user receives a phone call from someone claiming to be from their bank's fraud department, informing them of suspicious activity on their account. The caller asks the user to verify their account details, including their account number and PIN, to resolve the issue. Unaware of the scam, the user provides the requested information, which the attacker then uses to access their bank account.
Prevention/Remediation:
Educate employees about the risks of vishing attacks and the importance of verifying the identity of callers before disclosing sensitive information.
Implement caller ID verification systems to help users identify potential vishing calls.
Establish clear procedures for handling requests for sensitive information over the phone, including verifying the legitimacy of the request through known contacts.
Smishing (SMS Phishing):
Description: Smishing involves sending deceptive text messages to individuals, typically containing links to malicious websites or instructions to call a fraudulent phone number. Scenario: A user receives a text message claiming to be from a delivery service, notifying them of a package delivery failure and instructing them to click on a link to reschedule delivery. The link leads to a phishing website designed to steal the user's personal information.
Prevention/Remediation:
Enable spam filtering for SMS messages to detect and block suspicious or unsolicited texts.
Educate users about the risks of smishing and advise them to avoid clicking on links or responding to messages from unknown or untrusted sources.
Encourage users to report suspected smishing attempts to the appropriate authorities or IT security team.