Lesson 10 - Chapter 1: Malware Flashcards
What is malware?
software designed to do something harmful to a system or network
(maldad)
What are 4 of the many types of malware?
v, b, t, r
- Virus
- Boot Sector Virus
- Trojan Horse
- Rootkit
What is a virus?
a program with 2 jobs: to replicate and to activate
What is replication? (Virus)
it makes copies of itself by injecting itself as extra code added to the end of executable programs or hiding out in a drive’s boot sector
What is activation? (Virus)
when a virus does something like corrupt data or steal private information
A virus only replicates to….
other drives (thumb drives, optical media)
Can a virus replicate itself across networks?
No
A virus needs ___ ___ to spread
human action
What is a boot sector virus?
a virus that infects the boot sector of the hard drive (so the virus loads on boot)
(stays in memory, infects other files as they run)
What is a Trojan Horse?
malware that pretends to do one thing but behind the scenes does something evil
(can be a game, fake security program, etc)
Can a Trojan Horse replicate?
No
(viruses do replicate though)
What is a Rootkit?
a program that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive anti-malware tools
A rootkit by definition gains privileged access to a computer, which can strike what 3 things?
- Operating systems
- Hypervisors
- Firmware (hard drives, accessories)
What are 5 bad things malware can potentially do?
S
R
Z, b
C
G
- Harvest private information (spyware)
- Hold files for ransom (ransomware)
- Use the PC to attack other systems (zombie; botnet)
- Cryptomine
- Gain a foothold in the system
What is spyware?
software that spies on the computer user, collecting info about their activities and habits
Keyloggers are what type of software?
spyware
What are keyloggers? are they all malware? (2)
keyloggers log the user’s keystrokes and sends the data back to the spyware creator (harvesting important info like passwords, cc numbers)
not all are malware, parental controls use keyloggers
What is ransomware?
encrypts all the data it gains access to on a system and even mapped network drives!
What happens after ransomware locks up all your data?
the ransomware application pops up a message asking for money (often bitcoins) to decrypt your data often with a timer and if it reaches 0 triggers the deletion of the encryption keys
What’s a zombie?
an infected computer that obeys the commands of the malware creator
(zombie puppet)
What is a botnet?
a network of infected computers under the control of a single person or group
(can easily grow into millions of zombies for large networks)
[zombie horde]
What is a bot herder? What does it activate?
controls the botnet actions, activates scripts installed on the zombies to launch an attack
[Puppet master]
What’s one of the most common ways to send spam?
using botnets (use hacked/stolen bandwidth)
Which method is used to launch Denial of Service (DoS) and Distributed DoS (DDoS) attacks?
botnets
What is crypto mining?
using a computer’s processing power to “mine” for cryptocurrency
What malware method is used for crypto mining?
botnets
(malware creators use bots to take control of zombies and steal processing power as a mining ‘team’)