Malware Flashcards
For Malware to infect your system it needs to create 2 things, and they are:
Threat Vector
Attack Vector
A specific method used by an attacker to infiltrate a victims machine, like using some unpatched software, installing code, Phishing campaigns or how they can get in is known as a:
Threat Vector
The actual means by which an attacker gains access to a computer to infect the system with Malware and how they’re going to infect the system is know as:
Attack Vector
Popular security patch from 2017:
MS17-010
Malicious software or code that runs and attaches to clean files and spreads into a computer system without the user’s knowledge is known as a
Virus
Stand-alone malware programs that replicate and spread to other systems by exploiting software vulneralbilities
Worms
Malicious programs which appear to be legitimate software that allowed unauthorized access to a victims system when executed.
Trojans
These are compromised computers that are remotely controlled by attackers and used in coordination to form what is called a botnet:
Zombies
A network of zombies that are often used for DDOS attacks, spam distribution, or cryptocurrency mining is:
Botnet
Malicious tools that hide their activities and operate at or below the OS level to allow for ongoing privileged access are known as:
Rootkits
These are malicious means of bypassing normal authentication processes to gain unauthorized access to a system
Backdoors
This is embed code placed in legitimate programs that executes a malicious action when a specific condition or trigger occurs:
Logic Bombs
These record a user’s keystrokes and are used to capture passwords or other sensitive information.
keyloggers
this secretly monitors and gathers user info or activities and sends data to third parties:
Spyware
this is Unnecessary or pre-installed software that consumes system resources and space without offering any value to the user.
Bloatware
There are 10 different types of viruses that you should be aware of:
Boot Sector
Macro
Program
Multipartite
Encrypted
Polymorphic
metamorphic
Stealth
Armor
Hoax
this type of virus is stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up:
Boot Sector
this type of virus is a form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed:
macro virus
this type of virus tries to find executables or application files to infect with their malicious code:
Program virus
This virus is designed to hide itself from being detected by a encrypting its malicious code or payloads to avoid detection by any antivirus software:
Encrypted Virus
A combination of a boot sector type virus and a program virus. It’s possible that a technician can actually remove the program virus from your machine but miss the one in the boot sector, hince the name:
Mulitpartite virus
This is an advanced version of an encrypted virus but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order for it to evade detection.
Polymorphic Virus
This virus is able to rewrite itself entirely before it attempts to infect a given file:
Metamorphic Virus
this is not necessarily a specific type of virus as much as it is a technique used to prevent the virus from being detected by the anti-virus software.
Stealth virus
This type of virus has a layer of protection to confuse a program or a person who’s trying to analyze it
Armored Virus
this is technically not a virus but instead a form of technical social engineering that attempts to scare end users into taking undesirable action on their system
Hoax
A piece of malicious software much like a virus, but it can replicate itself without any user interaction. They are best known for spreading far and wide over the Internet in a relatively short amount of time.
Worm