Malware Flashcards
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
Malware
Method used to infiltrate a victim’s machine
Examples:
○ Unpatched software
○ USB drive installation
○ Phishing campaigns
Threat Vector
Means by which the attacker gains access and infects the system. Combines both infiltration method and infection process
Attack Vector
Viruses, Worms, Trojans, Ransomware, Zombies/Botnets, Rootkits, are examples of what?
Malware Attacks
Made up of malicious code that’s run on a machine without the user’s knowledge and this allows the code to infect the computer whenever it has been run
Computer Virus
Attach to clean files, spread, and corrupt host files
Viruses
Type of malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker
Ransomware
Compromised computers remotely controlled in a network for malicious purposes
Zombies and Botnets
Hide presence and activities on a computer, operate at the OS level
Rootkits
Backdoors allow unauthorized access, logic bombs execute malicious
actions
Backdoors and Logic Bombs
Record keystrokes, capture passwords or sensitive information
Keyloggers
Spyware monitors and gathers user/system information, bloatware
consumes resources without value
Spyware and Bloatware
The following signs are indicators of what?
● Account lockouts
● Concurrent session utilization
● Blocked content
● Impossible travel
● Resource consumption
● Inaccessibility
● Out-of-cycle logging
● Missing logs
● Documented attacks
Malware Attacks
Virus that is stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up
Boot Sector
Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed.
Macro Virus
Try to find executables or application files to infect with their malicious code
Program Virus
Combination of a boot sector type virus and a program virus.
Able to place itself in the boot sector and be loaded every time the
computer boots
It can install itself in a program where it can be run every time the
computer starts up
Multiparite Virus
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
Encrypted Virus
Advanced version of an encrypted virus, but instead of just encrypting the contents it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection.
Polymorphic Virus
Able to rewrite themselves entirely before it attempts to infect a given file
Metamorphic Virus
Technique used to prevent the virus from being detected by the anti-virus software
Stealth Virus
Have a layer of protection to confuse a program or a person who’s trying to analyze it
Armored Virus
Form of technical social engineering that attempts to scare our end users into taking some kind of undesirable action on their system
Hoax Virus
Piece of malicious software, much like a virus, but it can replicate itself without any user interaction
Able to self-replicate and spread throughout your network without a user’s consent or their action
Best known for spreading far and wide over the internet in a relative short amount of time
Worm
Piece of malicious software that is disguised as a piece of harmless or desirable software. Claims that it will perform some needed or desired function for you.
commonly used today by attackers to exploit a vulnerability in your
workstation and then conducting data exfiltration to steal your sensitive documents, creating backdoors to maintain persistence on your systems, and other malicious activities.
Trojans
Widely used by modern attackers because it provides the attacker with remote control of a victim machine
Remote Access Trojan (RAT)
Network of compromised computers or devices controlled remotely by malicious actors
Botnet