Malware Flashcards
Boot Sector Virus
Stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up -
Macro
Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user by the user, the virus is executed
Program
Try to find executables or application files to infect with their malicious code
Multipartite
Combination of a boot sector type virus and a program virus
Able to place itself in the boot sector and be loaded every time computer boots
It can install itself in a program where it can be run every time the computer starts up
Encrypted
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
Polymorphic
Advanced version of an encrypted virus, but instead of just encrypting the content it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection
Metamorphic
Able to rewrite themselves entirely before it attempts to infect a given file
Stealth
Technique used to prevent the virus from being detected by the anti virus software
Armored
Have a layer of protection to confuse a program or a person who’s trying to analyze it
Hoax
Form of technical social engineering that attempts to scare our end users
Worm
Piece of malicious software, much like a virus, but it can replicate itself without any user interaction
Able to self replicate and spread throughout your network without a user’s consent on their action
What are the two dangerous reason why worm are bad
Infect your workstation and other computing assets
Cause disruptions to your normal network traffic since they are constantly trying to replicate and spread themselves across the network
Trojan
Piece of malicious software that is disguised as a piece of harmless or desirable software
Claims that it will perform some needed or desired functions for your
What is a RAT
Remote access trojan
Widely used by modern attackers because it provided the attacker with remote control of a victim machine
It uses to exploit a vulnerability in your workstation and then conducting data exfiltration to steal your sensitive documents creating backdoors to maintain persistence on your systems , and other malicious activities
Ransomware
Type of malicious software the is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker
GIVE ME THE WAYS TO PROTECT OURSELVES AND OUR ORGANIZATIONS AGAINST RANSOMEWARE
- Always conduct regular backups
- Install software updates regularly
- Provide security awareness training to your users
- Implement MFA
What should you do if you find yourself or your organization as the victim of a ransomware attack?
- Don’t pay the ransom
- Suspect ransomware has infected your machine, you should disconnect it from the network
- Notify the authorities
- Restore your data and systems from known good backups
Botnets
Network of compromised computers or devices controlled remotely by malicious actors
Zombies
Name of a compromised computer or device that is part of a botnet
Used to perform tasks using remote commands from the attackers without the user’s knowledge