Malware Flashcards
Malware
broad term used to describe any type of malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
Identifying Ransomware:
Encrypted files with a ransom note demanding payment in exchange for decryption keys.
Identifying Trojans:
Unexpected or unauthorized access, changes in system settings, or suspicious network activity.
Identifying Worms:
Rapid self-replication and spreading across a network or multiple systems.
Identifying Potentially Unwanted Programs (PUPs):
Unwanted toolbars, adware, or browser extensions installed without user consent.
Identifying Fileless Virus:
Unusual or suspicious processes running in memory without traditional executable files.
Identifying Command and Control (C2):
Communication with external C2 servers, often via unusual or non-standard network ports.
Identifying Bots:
A network of compromised devices (botnet) controlled by a central command center.
Identifying Cryptomalware:
Encrypted files with a ransom demand or ransom payment address.
Identifying Logic Bombs:
Unexpected system or application behavior triggered by specific conditions or dates.
Identifying Spyware:
Unusual network traffic, unauthorized access to sensitive data, or suspicious system activity.
Identifying Keyloggers:
Unauthorized access to sensitive data or evidence of keystroke recording.
Identifying Remote Access Trojan (RAT)
Suspicious or unauthorized remote access or control of a system.
Identifying Rootkit:
Concealed processes or files, unusual system behavior, or unauthorized access.
Identifying Backdoor:
Unauthorized access, unusual network traffic, or the presence of hidden pathways.
Password Attacks
Password attacks are attempts by malicious actors to gain unauthorized access to a system or account by guessing or cracking passwords.
Identifying Password Spraying:
Multiple login attempts with the same password against multiple user accounts.
Identifying Dictionary Attack:
Repeated login attempts using words from a dictionary or common passwords.
Identifying Brute Force Attack (Online):
Continuous and rapid login attempts without delay between each attempt.
Identifying Brute Force Attack (Offline):
Theft or possession of hashed password data (e.g., from a database breach).