Domain 1 Flashcards
SPIM
SPIM is spam (or mass unsolicited messages) but over instant messaging or Internet messaging services, such as WhatsApp, Facebook Messenger, Skype, or Telegram.
Spam
Spam or bulk unsolicited messages, usually sent in the form of email advertisements or other appealing material, may deliver malware or lure a user to another form of attack.
Spear phishing
Spear phishing is a phishing scam where the attacker has some information that makes an individual target more likely to be fooled by the attack.
Whaling
Whaling is a spear phishing attack directed specifically against upper levels of management in the organization (CEOs and other “big fish”).
pharming
Pharming is a passive means of redirecting users from a legitimate website to a malicious one by corrupting the way the victim’s computer performs Internet name resolution.
Credential Harvesting
Credential harvesting is a campaign specifically designed to steal account credentials. The attacker has more interest in selling the database of captured logins than trying to exploit them directly.
Watering Hole
A watering hole attack relies on the circumstance that users may use an unsecure third-party website, like a local pizza firm, which the attacker has compromised.
Typosquatting
Typosquatting occurs when a threat actor registers a domain name that is similar to a real one and tricks users into thinking they are going to a legitimate website even when they misspell the name a little.
Domain hijacking
Domain hijacking is a type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Brandjacking is another term for domain hijacking.
Kiting
Kiting is the act of continually registering, deleting, and reregistering a name within the five-day grace period without having to pay for it.
Tasting
Tasting is a Domain Name Server (DNS) exploit that involves registering a domain temporarily to see how many hits it generates within the five-day grace period.
Hoax attack
In a hoax attack, an email alert or web pop-up will claim to have identified some sort of security problem, such as a virus infection, and offer a tool to fix the problem. The tool, of course, will be some sort of Trojan application.
Spyware
Spyware is a program that monitors user activity and sends the information to someone else. This can occur with or without the user’s knowledge.
Rogueware
Rogueware is a fake antivirus web pop-up that claims to have detected viruses on the computer and prompts the user to initiate a full scan, which installs the attacker’s Trojan.
Trust
To be convincing (or to establish trust) usually depends on the attacker obtaining privileged information. An impersonation attack is much more effective if the attacker knows the information about the employee.
Shoulder surfing
Shoulder surfing refers to stealing a password or PIN (or other secure information) by watching the user type it, either in close proximity or remotely.
Lunchtime attack
If a user leaves a workstation unattended while logged on, an attacker can physically gain access to the system (often described as a lunchtime attack).
Tailgating
Tailgating is a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.
Adware
Adware is software that records information about a PC and its user, and usually displays pop-ups of commercial offers and deals.
Trojan
A Trojan is a malicious program hidden within an innocuous-seeming piece of software. Usually, the Trojan tries to compromise the security of the target computer.
Crypto-malware
Crypto-malware is a class of ransomware that attempts to encrypt data files. If the attack is successful, the user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.
Keylogger
A keylogger actively attempts to steal confidential information by recording keystrokes. The attacker will usually hope to discover passwords or credit card data.
What does Fileless Malware use?
“live off the land” techniques rather than compiled executables to evade detection. This means that the malware code uses legitimate scripting tools like Windows PowerShell. uses lightweight shellcode to achieve a backdoor mechanism on the host.can be classified as using low observable characteristics (LOC) attacks which can make it less intrusive than other malware.
If a user’s computer becomes infected with a botnet, which of the following can this compromise allow the attacker to do?
RAT backdoor applications can allow the attacker to use the computer in a botnet to launch Distributed Denial of Service (DoS) attacks.to launch mass-mail spam attacks.A RAT must establish a connection from the compromised host to a Command and Control (C2 or C&C) host or network operated by the attacker.