Domain 1.0 Threats, Attacks, and Vulnerabilities Flashcards
worm
a memory- resident malware that run without user intervention and replicate over network resources
fileless malware
does write its code to disk. It uses memory resident techniques to run its own process, within a host process or dynamic link library
dynamic link library
a collection of small programs that larger programs can load when needed to complete specific tasks
shellcode
lightweight block of malicious code that exploits a software vulnerability to gain initial access to a victim system
“live off the land” malware
malware may use legitimate system scripting tools, notably PowerShell and Windows Management Instrumentation (WMI) to execute payload actions
advance persistent threat (APT) and advanced volatile threat (AVT)
describe class of modern filess/live off the land malware
Low Observable Characteristics (LOC) attack
a type of stealth attack that evades detection by most security solutions and impacts forensic analysis efforts
backdoor
any type of access method to a host that circumvents the usual authentication method and gives the remotes user administrative control
Remote Access Trojan or Remote Administration Tool (RAT)
a backdoor malware that mimics the functionality of legitimate remote control programs but is designed specifically to operate covertly
A host that is under control by a RAT is called a zombie
command and control (C2 or C&C)
an infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets
covert channel
a type of attack that subverts network security systems and policies to transfer data without authorization or detection
Internet relay chat (IRC)
a group communication protocol that enables users to chat, send private messages, and share files
rootkit
a class of malware that modifies system files, often at the kernel level to conceal its presence
Crypto-malware ransomeware
encrypts data files on any fixed, removable, and network drives
the user will be unable to access files without obtaining the private encryption key, held by the attacker
Cryptolocker
crypto-mining/cryptojacking
hijacks the resources of the host to perform cryptocurrency mining