Malware Flashcards
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.
Malware
What are 7 types of malware classifications?
Viruses Worms Trojan Horses Ransomware Spyware Rootkits Spam
Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.
Viruses
What are 10 types of virus classifications?
Boot sector Marco Program Multipartite Encrypted Polymorphic Metamorphic Stealth Armored Hoax
Viruses that are stored in the first sector of a hard drive and are loaded into memory upon boot up.
Boot sector
A virus embedded into a document and is executed when the document is opened by the user.
Macro
Viruses that infect an executable or application.
Program
Viruses that combine boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.
Multipartite
Viruses that use a cypher to encrypt the contents of itself to avoid detection.
Encrypted
An advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection.
Polymorphic
A virus that is able to rewrite itself entirely before it attempts to infect a file. An advanced version of a polymorphic virus.
Metamorphic
A category of viruses that use various techniques to avoid detection. Examples are encrypted, polymorphic and metamorphic.
Stealth
Viruses that have a layer of protection to confuse a program or person analyzing it.
Armored
A virus used to trick a user into infecting their own machine.
Hoax
Malicious software like a virus, but is able to replicate itself and spread without user consent or interaction.
They can cause disruption to normal traffic and computing activities.
Worms
Malicious software that is disguised as a piece of harmless or desirable software, and performs malicious functions.
Trojan Horse
Provides the attacker with remote control of the victim computer and is the most commonly used type of trojan.
Remote Access Trojan (RAT)
Malware that restricts access to a victim’s computer system until a ransom is received. Uses a vulnerability in software to gain access and then encrypts files.
Ransomware
Malware that secretly gathers information about the user without their consent. Can capture keystrokes made by the victim, and take screenshots that are sent to the attacker.
Spyware
A type of spyware that displays advertisements based on your behavior it has observed.
Adware
Software that isn’t benign nor malicious and tends to behave improperly without serious consequences.
Grayware
Software designed to gain administrative level control over a system without detection.
They are activated before booting the operating system and are difficult to detect.
Rootkit
A type of rootkit who’s malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.
Is commonly used by rootkits to maintain persistent control.
DLL Injection
A type of rootkit that relies on compromising the kernel-mode device drivers that operate at a privileged or system level. Acts as a shim that is placed between two components to intercept called and redirect them.
Driver Manipulation
Activity that abuses electronic messaging systems, most commonly through mail.
Spam
Spammers often exploit a company’s open mail relays to send their messages.
This law was put in place to combat this, making companies that have vulnerable open mail relays liable.
CAN-SPAM Act of 2003