Malware Flashcards
What is Malware?
Malicious software designed to infiltrate computer systems and potentially damage them without user consent.
Types of Malware attacks
Viruses
Worms
Trojans
Ransomware
Zombies / Botnets
Rootkits
Backdoors / Logic Bombs
keyloggers
Spyware and Bloatware
What is a virus?
Malicious code that’s run on a machine without the user’s knowledge and this allows the code to infect th e computer whenever it has been run.
Types of viruses
Boot sector
Macro
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armoured
Hoax
What is a Boot Sector virus?
one that is stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up.
What is a Macro Virus?
Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed.
What is a Program Virus?
Try to find executables or application files to infect with their malicious code
What is a Multipartite Virus?
Combination of a boot sector type virus and a program virus.
What is an Encrypted Virus?
Designed to hide itself from being detected by encrypting its rmalicious code or payloads to avoid detection ny an anti-virus software.
What is a Polymorphic Virus?
Advanced version of an encrypted virus, but instead of just encrypting the contents it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection.
What is a Metamorphic Virus?
Able to rewrite themselves entirely before it attempts to infect a given file.
What is a Stealth Virus?
Technique used to prevent the virus from being detected by the anti-virus software.
What is an Armored virus?
Have a layer of protection to confuse a program or a person who’s trying to analyze it.
What is a Hoax Virus?
Form of technical social engineering that attempts to scare our end users.
What is a Worm?
Piece of malicious software, much like a virus, but if can replicate itself without any user interaction.
Able to self - replicate and spread throughout your network without a user’s consent or their action