Malware Flashcards

1
Q

Malware

A

broad term used to describe any type of malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identifying Ransomware:

A

Encrypted files with a ransom note demanding payment in exchange for decryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifying Trojans:

A

Unexpected or unauthorized access, changes in system settings, or suspicious network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identifying Worms:

A

Rapid self-replication and spreading across a network or multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identifying Potentially Unwanted Programs (PUPs):

A

Unwanted toolbars, adware, or browser extensions installed without user consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identifying Fileless Virus:

A

Unusual or suspicious processes running in memory without traditional executable files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identifying Command and Control (C2):

A

Communication with external C2 servers, often via unusual or non-standard network ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identifying Bots:

A

A network of compromised devices (botnet) controlled by a central command center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identifying Cryptomalware:

A

Encrypted files with a ransom demand or ransom payment address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identifying Logic Bombs:

A

Unexpected system or application behavior triggered by specific conditions or dates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identifying Spyware:

A

Unusual network traffic, unauthorized access to sensitive data, or suspicious system activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifying Keyloggers:

A

Unauthorized access to sensitive data or evidence of keystroke recording.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identifying Remote Access Trojan (RAT)

A

Suspicious or unauthorized remote access or control of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identifying Rootkit:

A

Concealed processes or files, unusual system behavior, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identifying Backdoor:

A

Unauthorized access, unusual network traffic, or the presence of hidden pathways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Attacks

A

Password attacks are attempts by malicious actors to gain unauthorized access to a system or account by guessing or cracking passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identifying Password Spraying:

A

Multiple login attempts with the same password against multiple user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identifying Dictionary Attack:

A

Repeated login attempts using words from a dictionary or common passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identifying Brute Force Attack (Online):

A

Continuous and rapid login attempts without delay between each attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identifying Brute Force Attack (Offline):

A

Theft or possession of hashed password data (e.g., from a database breach).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identifying Rainbow Table Attack:

A

Rapid password cracking with the use of precomputed rainbow tables.

22
Q

Identifying Plaintext/Unencrypted Password Attack:

A

Passwords stored in plaintext format.

23
Q

Physical Attacks:

A
  • Malicious USB Cable
  • Malicious Flash Drive
  • Card Cloning
  • Skimming
24
Q

Identifying Malicious USB Cable:

A

The presence of a suspicious or unknown USB cable connected to a device, computer, or network.

25
Identifying Malicious Flash Drive:
Discovery of unknown or unverified USB flash drives in the organization, especially in public areas or near workstations.
26
Identifying Card Cloning:
Unusual or unauthorized transactions on payment cards or access control systems.
27
Identifying Skimming:
Suspicious or unusual devices attached to card readers, ATMs, or payment terminals.
28
Adversarial Artificial Intelligence (AI):
- Unusual Model Behavior - Misclassification or Misbehavior - Anomalies in Model Confidence - Increased False Positives/Negatives
29
Identifying Unusual Model Behavior:
If an AI model exhibits unexpected or erratic behavior, it could be an indicator of an adversarial AI attack. Adversaries may manipulate inputs to exploit vulnerabilities in the model.
30
Identifying Misclassification or Misbehavior:
Frequent misclassification of inputs or outputs that do not align with the model's intended behavior may indicate adversarial interference.
31
Identifying Anomalies in Model Confidence:
If the model's confidence scores fluctuate widely or show inconsistencies, it could suggest adversarial attempts to undermine the model's accuracy.
32
Identifying Increased False Positives/Negatives:
A noticeable increase in false positives or false negatives in AI-based security systems, such as intrusion detection or spam filters, might indicate adversarial attacks.
33
Tainted Training Data for Machine Learning (ML):
- Data Inconsistencies - Unusual Model Performance - Unexpected Bias - Data Source Anomalies
34
Identifying Data Inconsistencies:
Analyze the training data for inconsistencies, inaccuracies, or anomalies that could indicate tampering or poisoning.
35
Identifying Unusual Model Performance:
If the ML model exhibits poor or erratic performance, it may be a sign of tainted training data.
36
Identifying Unexpected Bias:
Check for unexpected biases or discriminatory behavior in the ML model, which can be introduced through malicious data manipulation.
37
Identifying Data Source Anomalies
Investigate the sources of training data for any signs of compromise, such as unauthorized access or alterations.
38
Security of Machine Learning Algorithms:
- Model Evasion - Unauthorized Access - Model Stealing - Abnormal Resource Usage
39
Supply-Chain Attacks:
- Unusual Network Activity - Unauthorized Access - Vendor Alerts
40
Identifying Unusual Network Activity:
An increase in network traffic or unusual data transfers between systems within your supply chain may indicate a supply-chain attack.
41
Identifying Unauthorized Access:
Suspicious login attempts or unauthorized access to systems or applications within your supply chain can be indicative of an attack.
42
Identifying Vendor Alerts:
Notifications or alerts from your suppliers or vendors about a security breach or compromise on their end may signal a supply-chain attack.
43
Cloud-Based vs. On-Premises Attacks:
- Anomalous Cloud Activity - On-Premises Intrusion - Logs and Alerts
44
Identifying Anomalous Cloud Activity:
In a cloud-based attack, you might observe unusual or unauthorized activities in your cloud services, such as accessing sensitive data, changing configurations, or spinning up new instances.
45
Identifying On-Premises Intrusion:
In an on-premises attack, signs may include unusual system or network activity, unauthorized access to physical premises, or signs of tampering with hardware or servers.
46
Identifying Logs and Alerts:
Monitor logs and security alerts from both cloud-based and on-premises systems to detect suspicious activities and breaches.
47
Cryptographic Attacks:
- Birthday Cryptographic Attack - Collision Cryptographic Attack - Downgrade Cryptographic Attack
48
Identifying Birthday Cryptographic Attack:
- A sudden increase in collisions in hash functions or unexpected hash collisions in your system logs. - Difficulty in verifying data integrity or authenticity due to hash collisions.
49
Identifying Collision Cryptographic Attack:
- Instances where two different inputs produce the same cryptographic hash. - Repeated failures in verifying digital signatures or certificates.
50
Identifying Downgrade Cryptographic Attack:
- Errors or issues with the negotiation of cryptographic protocols during secure communications. - Unexpectedly weak encryption algorithms being used in secure connections.