Malware Flashcards
Malware
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
Threat Vector
method used to infiltrate a victim’s machine
examples:
- USB drive installation
- unpatched software
- phishing campaigns
Attack Vector
Means by which the attacker gains access and infects the system
- combines infiltration method and infection process
Viruses
Computer virus made up of malicious code that’s run on a machine without the user’s knowledge and this allows the code to infect the computer whenever it has been run
- attach to clean files, spread and corrupt host files
10 Types of Viruses
- Boot sector
- Macro
- Program
- Multipartite
- Encrypted
- Polymorphic
- Metamorphic
- Stealth
- Armored
- Hoax
Boot Sector Virus
stored in the first sector of a hard drive then loaded into memory whenever the computer boots up
Macro Virus
code that allows a virus to be embedded inside another document so when opened by user, virus is executed
Program Virus
Try to find executables or application files to infect with their malicious code
Multipartite Virus
combo of boot sector and program; place itself in boot sector and can load every time computer boots; can install itself in a program where it can be run at computer startup
Encrypted Virus
hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
Polymorphic Virus
advanced encrypted virus; also changes the viruses code each time it is executed by altering the decryption module to evade detection
Metamorphic Virus
Able to rewrite themselves entirely before it attempts to infect a given file
Stealth Virus
Technique used to prevent the virus from being detected by the anti-virus software
Armored Virus
Have a layer of protection to confuse a program or a person who’s trying to analyze it
Hoax Virus
Form of technical social engineering that attempts to scare our end usersinto taking some kind of undesirable action on their system
Worms
Standalone programs replicating and spreading to other computers without any user interaction or consent
- Known for spreading far and wide over internet in short time
Danger:
- Infects your workstation and other computing assets
- Cause disruptions to your normal network traffic since they try to replicate across network
Trojans
Disguise as a legitimate software, grant unauthorized access; claims it will perform some needed or desired function for you
commonly used today to exploit:
- a vulnerability in your workstation -
- conduction data exfiltration
- create backdoors to maintain persistence on your system
- etc.
Remote Access Trojan (RAT)
Widely used by modern attackers because it provides the attacker with remote control of a victim machine