Malware Flashcards

1
Q

Boot Sector Virus

A

Stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Macro

A

Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user by the user, the virus is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Program

A

Try to find executables or application files to infect with their malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multipartite

A

Combination of a boot sector type virus and a program virus
Able to place itself in the boot sector and be loaded every time computer boots
It can install itself in a program where it can be run every time the computer starts up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encrypted

A

Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Polymorphic

A

Advanced version of an encrypted virus, but instead of just encrypting the content it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Metamorphic

A

Able to rewrite themselves entirely before it attempts to infect a given file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stealth

A

Technique used to prevent the virus from being detected by the anti virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Armored

A

Have a layer of protection to confuse a program or a person who’s trying to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hoax

A

Form of technical social engineering that attempts to scare our end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Piece of malicious software, much like a virus, but it can replicate itself without any user interaction
Able to self replicate and spread throughout your network without a user’s consent on their action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two dangerous reason why worm are bad

A

Infect your workstation and other computing assets
Cause disruptions to your normal network traffic since they are constantly trying to replicate and spread themselves across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan

A

Piece of malicious software that is disguised as a piece of harmless or desirable software
Claims that it will perform some needed or desired functions for your

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a RAT

A

Remote access trojan
Widely used by modern attackers because it provided the attacker with remote control of a victim machine
It uses to exploit a vulnerability in your workstation and then conducting data exfiltration to steal your sensitive documents creating backdoors to maintain persistence on your systems , and other malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

Type of malicious software the is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GIVE ME THE WAYS TO PROTECT OURSELVES AND OUR ORGANIZATIONS AGAINST RANSOMEWARE

A
  1. Always conduct regular backups
  2. Install software updates regularly
  3. Provide security awareness training to your users
  4. Implement MFA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should you do if you find yourself or your organization as the victim of a ransomware attack?

A
  1. Don’t pay the ransom
  2. Suspect ransomware has infected your machine, you should disconnect it from the network
  3. Notify the authorities
  4. Restore your data and systems from known good backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Botnets

A

Network of compromised computers or devices controlled remotely by malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zombies

A

Name of a compromised computer or device that is part of a botnet
Used to perform tasks using remote commands from the attackers without the user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Command and Control Node

A

Computer responsible for managing and coordinating the activities of other nodes or devices within a network

21
Q

what is the most common use of botnet

A

DISTRIBUTED denial of service attack it occurs when many machines target a single viciim and attack them at the exact same time

22
Q

What are Botnets are used

A

as pivot points
disguise the real attacker
to host illegal activities
to spam others by sending out phishing campaigns and other malware

23
Q

Botnets are used attackers to combine processing power to break through different types of encryption schemes

A

botnets

24
Q

What is the percentage that an attackers use for the zombies power

A

20-25%

25
Q

Rootkit

A

Designed to gain administrative level control over a given computer system without being detected

26
Q

What can you do administrator account

A

install programs, delete programs, open ports, shut ports, do whatever it is they want to do on that system

27
Q

A computer system has several different rings of permissions throughout the system

A

Ring 3- Where user level permissions are used
Ring 0 - Operating in Ring is called kernel mode
Allows a system to control access to things like device drivers, your sound card, your video displays or monitor, and other similar things

28
Q

Rootkit what does it do

A

it tries to move from ring 1 to Ring 0 so that it can hide from other functions of the operating system to avoid detection

29
Q

One technique used by rootkit to gain this deeper level of access is a

A

DLL injection - technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic link library

30
Q

Dynamic Link Library

A

Collection of code and data that can be used by multiple programs simultaneously to allow for code reuse and modularization in software

31
Q

Shims

A

Piece of software code that is placed between two components and that intercepts the calls between those components and can be used redirect them

32
Q

Rootkits are extremely powerful, and they are very diffcult to detect because the operating system is essentially blinded to them

A

To detect them, the best way is to boot from an external device and then scan the internal hard drive to ensure that you can detect those rootkits using a good anti malware scanning solution from a live boot linux distribution

33
Q

Backdoor

A

Originally placed in compute program to bypass the normal security and authentication functions
Most often put into system by designers and programmers

34
Q

Does a rat act like a backdoor?

A

Yes, can be placed by a threat actor on your computer to help them maintain persistent access to that system

35
Q

Logic bombs

A

Malicious code that’s insert into a program, and the malicious code will only execute when certain conditions have been met

36
Q

What is keylogger

A

Piece of software or hardware that records every single keystroke that is made on a computer or mobile device

37
Q

Software keyloggers

A

Malicious programs that get installed on a victim’s computer
Often bundled with other software or delivered through social engineering attacks, like phishing or pretexting attacks

38
Q

Hardware Keyloggers

A

Physical devices that need to be plugged into a computer
These will resemble a USB drive or they can be embedded within a keyboard cable itself

39
Q

Spyware

A

Malicious software that is designed to gather and send information about a user or organization without their knowledge

40
Q

Some ways spyware can get installed on a system

A

Bundled with other software
Installed through malicious website
Installed when users click on a deceptive pop up advertisement

41
Q

Bloatware

A

Any software that come pre installed on a new computer that you as the user did not specifically request want or need

42
Q

Malware Exploitation Techniques

A

Specific method by which malware code penetrates and infects a targeted system

43
Q

Some malware focuses on infecting the systems memory to leverage remote procedure calls over the organizations network

A

Most modern malware uses fileless techniques to avoid detection by signature based security software
Fileless malware is used to create a process in the system memory without relying on the local file system of the infected host

44
Q

How does this modern malware work
Talk about the two stages

A
  1. Dropper or downloaders
    Dropper Specific malware type designed to initiate or run other malware forms within a payload on an infect host
    Downloader- Retrieve additional tools post the initial infection facilitated by a dropper
    Stage 2: Downloads and installs a remote access Trojan to conduct command and control on a the victimized system.
45
Q

Actions on objectives Phase

A

Threat actors will execute primary objectives to meet core objectives like data infiltration, file encryption

46
Q

Concealment

A

Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasing log files, hiding an evidence of malicious activity

47
Q

What does living off the land mean

A

A strategy adopted by many Advanced Persistent Threats and criminal organizations
the threat actors try to exploit the standard tools to perform intrusions

48
Q

Describe Account Lockouts

A

Malware especially those designed for credential thrift or brute force attacks can trigger multiple failed login attempts that would result in a users account being locked out