Malware Flashcards
Malware
Any software that is designed to infiltrate a computer system without the user’s knowledge.
Threat Vector
Specific method used by an attacker to infiltrate a victm’s machine. Breaks into system.
Attack Vector
A means by which an attacker gains access to a computer to infect the system with malware. Breaks into and infects system.
Computer Virus
Malicious code is run on a machine without the user’s knowledge, and this allows for the code to infect the computer wherever it has been run.
Boot Sector Virus
Stored in the first sector of the hard drive and then loaded into memory whenever the computer boots
Macro Virus
A form of code that allows a virus to be embedded inside another document so that when the user is opening that document, the virus is executed.
Program Virus
Tries to find executables or application files to infect with their malicious code.
Multipartile virus
A combination of a boot sector type virus and a program virus. Even if someone finds the program part of the virus and cleans it out from within the OS, they may have missed the boot sector portion.
Encrypted Virus
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
Polymorphic Virus
Advanced version of an encrypted virus, but instead of just encrypting the contents, it will actually change the virus’ code each time it is executed by altering the decryption model in order for it to evade detection.
Metamorphic Virus
Able to rewrite itself entirely before it attempts to infect a given file. More advanced version of a polymorphic virus.
Worm
Piece of malicious software, much like a virus, but it can replicate itself without any user interaction.
Worm vs Virus
Worm - Can replicate itself without interaction from the user
Virus - Requires the user to take some action.
Trojan
A piece of malicious software that is disguised as a piece of harmless or desirable software.
RAT
Remote Access Trojan. This type of trojan is widely used by modern attackers because it provides the attacker with remote control of a victim’s machine.