Malware Flashcards
Malware
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent
Virus
Malicious code that runs on a machine without the users knowledge and infects the computer when executed
Boot Sector Virus
Stored in the first sector of a hard drive and loaded into memory upon boot up
Macro Virus
Virus embedded into a document and is executed when the document is opened by the user
Program virus
Infects an executable application
Multipartite Virus
Virus that combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer
Polymorphic Virus
Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection
Metamorphic Virus
Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced polymorphic virus)
Armored virus
Armored viruses have a layer of protection to confuse a program or person analyzing it
Hoax Virus
A virus that tries to trick a user into infect their own machine
Worm
Malicious software, like a virus, but is able to replicate itself without user interaction
Trojans
Malicious software disguised as a piece of harmless or desirable software
Remote access trojan (RAT)
Provides the attacker with remote control of a victim computer and is the most commonly used type of trojan
Ransomware
Malware that restricts access to a victim’s computer system until a ransom is received
Spyware
Malware that secretly gathers information about the user without their consent
Grayware
Software that isn’t benign nor malicious and tends to behave improperly without serious consequences
Rootkit
Software designed to gain administrative level control over a system without detection
DLL Injection
Malicious code is inserted into a running process on a windows machine by taking advantage of dynamic link libraries that are loaded at runtime
Driver Manipulation
An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level
Shim
Placed between two components to intercept calls and redirect them
Spam
Activity that abuses electronic messaging systems, most commonly through email
Spam Over Instant Messaging (SPIM)
Spam but utilizes instant messaging applications