Malware Flashcards

1
Q

How is malware classifed

A

How it spreads and the payload, as if they need a host program/are independent and whether it replicates or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Kit

A

A toolkit which provides a variety of payloads that novices can deploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Sources

A

Pollitically motivated, criminals, organised crime, organisations that sell services, national gov agenices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APTS Meaning

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APTS Definition

A

Persistent use of variety of intrusion tech to selected targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APTS Characteristics

A

Advanced (wide variety of tech), persistent (attacks over extended period of time), threats (active involvement of people increases threat liklihood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aim of APTS?

A

From stealing Intellectual property to disrupting a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APTS techniques

A

Social engineering, spear phishing, drive by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intent of APTS?

A

to infect target and use other tools to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

Malware which infects a program and modifies to include a copy. Secretely run when the host program is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus Components

A

Infection Mechanism (Vector), Trigger (Logic Bomb), Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus Phases

A

Dormant, Triggering, Propagation, Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Triggering Phase

A

Virus is activated caused by system events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dormant Phase

A

Virus is idle. will be activated. not all have this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Propagation Phase

A

Places a copy in programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Execution Phase

A

Function is performed, may be harmless or damaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Macro + Scripting Viruses

A

Attaches itself to documents and uses macro programming capabilities of documents application to execute and propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are macro viruses threatening

A

Platform dependent, infect documents not code, easily spread, traditional file access system control struggles to find them, much easier to write/modify than traditional viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virus Classifications

A

By Target, By Concealment strategy

20
Q

Break down Virus Classifications by target

A

Boot sector Infector, File Infector, Macro virus, Multi-partite Virus

21
Q

Break down Virus Classifications by concealment strategy

A

Encryption, Stealth, Polymorphic, Metamorphic

22
Q

What are Worms

A

Seeks more machines to infect. Infected machines serve as an auto launch pad. Exploits software vulnerabilites

23
Q

How do worms spread

A

Network Connections, Shared media, macro code in emails & instant messanger file transfer. Upon activation worm replicates and propagates.

24
Q

Worm Target Discovery

A

Scanning, Random, Hit-list, topological, local subnet

25
Q

Worm Technology

A

Multi-platform, multi exploit, ultrafast speading, polymorphic, metamorphic

26
Q

Mobile Code

A

Transmitted from a remote system to a local system and executed there. Often acts as a mechanism for a virus, worm, trojan.

27
Q

How is mobile code achieved

A

Cross site scripting, interative and dynamic websites, email attachements, downloads from untrusted sites

28
Q

Drive By Download

A

Webpage installs virus without user knowing

29
Q

Watering Hole Attack

A

variant of drive by download but targetted for a victim

30
Q

Malvertising

A

Malware on website in advertisements without comprimising them

31
Q

Clickjacking

A

Collecting a users clicks, can alter UI to add hidden buttons to redirect user

32
Q

Social Engineering

A

Tricking users to comprimise their own system

33
Q

How is Social Engineering achieved

A

Spam - Bulk Email, used for phishing, Trojan Horse, Ransomware

34
Q

Attack Agent Bots

A

Takes over another internet attached computer and uses to launch/manage attacks. Uses DDoS, spamming, sniffing, keylogging

35
Q

Remote Control Facility

A

Distinguishes a bot from a worm. Bot is controlled from a facility like an IRC server whereas worm propagates itself. Incomming message acts as commands for bots

36
Q

Keylogger

A

Captures keystrokes, can filter for keywords such as password

37
Q

Spyware

A

Monitors comprimised machine

38
Q

Info Theft Phishing

A

Exploits Social engineering to leverage users trust by pretending to be a trusted source

39
Q

Spearphishing

A

This is phishing but the target is selected and researched

40
Q

Stealthing backdoor

A

secret entrypoint in a program allowing attacker to bypass security

41
Q

Maintenance Hook

A

A backdoor used by programmers

42
Q

Rootkit characteristics

A

Persistent, Memory based, user mode, kernel mode, virtual machine based, external mode

43
Q

Malware prevention countermeasures

A

Policy, Awareness, Vulnerability mitigation, Threat Mitigation

44
Q

Malware countermeasures is prevention is failed

A

Detection, Identification, Removal

45
Q

Generations of Anti Virus

A

Simple Scanners, Heuristic Scanners, Activity traps, full featured protection

46
Q

Sandbox Analysis

A

Using malware in a VM to test, anaylse and mitigate