InfoSec Part 2 Flashcards
What is malware?
Bad as in, software that is intended to:
Disable computer systems
Disrupt operations
Steal data
A program that must be executed to have any impact
Keylogger
Logs your keystrokes (recording passwords, intellectual property)
Bot
Waiting for the command signal to do something on a computer
Remote control and allows cybercriminal to do anything they want
Ransomware
Encrypt your data and demand a ransom payment if you want it back
Types of systems targeted by malware … and which platform suffered nearly half of malware infections as of mid-2021?
Computers (Windows, Macintosh OS X, Linux)
Mobile devices (Android, iOS, etc.)
50% of all malware infections occur on Android phones
Trojans – what are they, and how do they compromise systems?
Hidden malware (utility software, game, bogus software updates)
No need for vulnerabilities
Banking Trojans
Stealing financial info
Spoofing
Keylogger
Man-in-the-middle
TrickBot, Panda, Kronos, Zeus, etc.
Remote Access Trojans
RAT Explosion
Read messages, monitor GPS location, record audio from mic, take pictures, etc.
Broad range of targets
Access
Modular, flexible
Fake Antivirus Trojans
Simulate the activity of antivirus software or parts of the OS security modules
Designed to extort money from users in return for the detection and removal of threats that are nonexistent
Repeated pop ups to make the user worry and pay for fake antivirus software
Viruses – what are they, and how do they propagate?
Hides itself inside host file. Self -replicating malware
Payloads - (Key-loggers, File destruction, None)
What is a macro? What is a macro virus?
Script capability in Office apps and others
Written code full of malware
Worms – what are they, and how do they propagate?
Stand-alone malware
- No “useful program”
- No infected host file
Self-propagating via network
Exploits vulnerabilities to invade systems
Similar payloads
Why is Email a powerful attack vector?
Ubiquitous (everyone has one)
Distribute as attachments, links
Large threat
What is phishing?
A scam by which an email user is duped into revealing personal or confidential info which the scammer can use illicitly
What three key scam techniques are used in a phishing attack?
Seems legit — spoofing
Sense of urgency
Call to action
What is spoofing? How is it used in phishing?
Message claims to be legit, but isn’t
Graphics are legit because attackers use graphics from the real site
Link looks legit, but it’s just text so it means nothing; hover over the link
Used in phishing to collect private data and deliver malware payload
Gain your trust
Fan the flames of urgency
So that you will take action now!
How can one avoid phishing scams?
Be suspicious of urgent requests
Be suspicious of requests for personal info
Check with the sender
Call them
Don’t use contact info on the phish
Don’t use links in an email
Type into a browser instead!
Employee training
How is spear phishing different from phishing? Consider the target and methods used.
Spear phishing is a targeted attack
Researched the target
Carefully crafted email
Apparently valid source
Personalized
Nicknames
Habits, preferences
Recent purchases
Recent promotions or job changes
What is Malvertising?
Using online advertising to promote malware
Drive-by Downloads
No interaction required
Exploits client vulnerability: OS, browser, plugin
Process:
Page loaded
Fingerprint analyzed
Vulnerabilities exploited
Malware downloaded & installed
Victim compromised
How can one defend against web-based malware?
Minimize use of Admin account
Keep OS, browser, plugins up-to-date
Minimize the attack surface
Be careful with popups!
Use an ad blocker!