Malware Flashcards

Objective 2.4

1
Q

Define / Explain

Malware

Malware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Malicious software designed to infiltrate computer systems and potentially damage them without user consent

Malware

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List

Malware Categories

Malware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Viruses
  • Worms
  • Trojans
  • Ransomware
  • Spyware
  • Rootkits
  • Spam

Malware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

D:efine / Explain

Threat Vector

Malware - Threat Vector vs. Attack Vector

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Method used to infiltrate a victim’s machine

Malware - Threat Vector vs. Attack Vector

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Informational

Threat Vector Examples

Malware - Threat Vector vs. Attack Vector

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Unpatched software
  • USB drive installation
  • Phishing campaigns

Malware - Threat Vector vs. Attack Vector

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define / Explain

Attack Vector

Malware - Threat Vector vs. Attack Vector

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Means by which the attacker gains access and infects the system
  • Combines both infiltration method and infection process

Malware - Threat Vector vs. Attack Vector

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define / Explain

Viruses

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Attach to clean files, spread, and corrupt host files

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define / Explain

Worms

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Standalone programs replicating and spreading to other computers

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define / Explain

Trojans

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Disguise as legitimate software, grant unauthorized access

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define / Explain

Ransomware

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Encrypts user data, demands ransom for decryption

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define / Explain

Zombies and Botnets

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Compromised computers remotely controlled in a network for malicious purposes

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define / Explain

Rootkits

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Hide presence and activities on a computer, operate at the OS level

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define / Explain

Backdoors and Logic Bombs

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Backdoors allow unauthorized access, logic bombs execute malicious actions

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define / Explain

Keyloggers

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Record keystrokes, capture passwords or sensitive information

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define / Explain

Spyware and Bloatware

Malware - Types of Malware Attacks

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Spyware monitors and gathers user/system information, bloatware consumes resources without value

Malware - Types of Malware Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Informational

Malware Techniques and Infection Vectors…

Malware - Malware Techniques and Infection Vectors

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Evolving from file-based tactics to modern fileless techniques
  • Multi-stage deployment, leveraging system tools, and obfuscation techniques

Malware - Malware Techniques and Infection Vectors

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Informational / List

Indications of Malware Attack…

Malware - Indications of Malware Attack

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Account lockouts
  • Concurrent session utilization
  • Blocked content
  • Impossible travel
  • Resource consumption
  • Inaccessibility
  • Out-of-cycle logging
  • Missing logs
  • Documented attacks

Malware - Indications of Malware Attack

Informational / List

17
Q

Define / Explain

Computer Virus

Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Made up of malicious code that’s run on a machine without the user’s knowledge and this allows the code to infect the computer whenever it has been run

Viruses

Define / Explain

18
Q

Define / Explain

Boot Sector

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

One that is stored in the first sector of a hard drive and is then loaded into memory whenever the computer boots up

Viruses - 10 Different Types of Viruses

Define / Explain

19
Q

Define / Explain

Macro

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed

Viruses - 10 Different Types of Viruses

Define / Explain

20
Q

Define / Explain

Program

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Try to find executables or application files to infect with their malicious code

Viruses - 10 Different Types of Viruses

Define / Explain

21
Q

Define / Explain

Multipartite

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Combination of a boot sector type virus and a program virus
  • Able to place itself in the boot sector and be loaded every time the computer boots
  • It can install itself in a program where it can be run every time the computer starts up

Viruses - 10 Different Types of Viruses

Define / Explain

22
Q

Define / Explain

Encrypted

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software

Viruses - 10 Different Types of Viruses

Define / Explain

23
Q

Define / Explain

Polymorphic

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Advanced version of an encrypted virus, but instead of just encrypting the contents it will actually change the viruses code each time it is executed by altering the decryption module in order for it to evade detection

Viruses - 10 Different Types of Viruses

Define/ / Explain

24
Q

Define / Explain

Metamorphic

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Able to rewrite themselves entirely before it attempts to infect a given file

Viruses - 10 Different Types of Viruses

Define / Explain

25
Q

Define / Explain

Stealth

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Technique used to prevent the virus from being detected by the ahnti-virus software

Viruses - 10 Different Types of Viruses

Define / Explain

26
Q

Define / Explain

Armored

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Have a layer of protection to confuse a program or a person who’s trying to analyze it

Viruses - 10 Different Types of Viruses

Define / Explain

27
Q

Define / Explain

Hoax

Viruses - 10 Different Types of Viruses

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Form of technical social engineering that attempts to scare our end users into taking some kind of undesirable action on their system

Viruses - 10 Different Types of Viruses

Define / Explain

28
Q

Define / Explain

Worm

Worms

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Piece of malicious software, much like a virus, but it can replicate itself without any user interaction
  • Able to self-replicate and spread throughout your network without a user’s consent or their action

Worms

Define / Explain

29
Q

Informational

Worms are dangerous for two reasons…

Worms

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Infect your workstation and other computing assets
  • Cause disruptions to your normal network traffic since they are constantly trying to replicate and spread themselves across the network

Worms

Informational

30
Q

Informational

Worms are best known for…

Worms

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

spreading far and wide over the internet in a relative short amount of time

Worms

Informational

31
Q

Define / Explain

Ransomware

Ransomware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A

Type of malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker

Ransomware

Define / Explain

32
Q

Informational

How can we protect ourselves and our organizations against ransomware?

Ransomware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Always conduct regular backups
  • Install software updates regularly
  • Provide security awareness training to your users
  • Implement Multi-Factor Authentication (MFA)

Ransomware

Informational

33
Q

Informational

What should you do if you find yourself or your organization as the victim of a ransomware attack?

Ransomware

Obj. 2.4 - Given a scenario, analyze indicators of malicious activity

A
  • Never pay the ransomd
  • If you suspect ransomware has infected your machine, you should disconnect it from the network
  • Notify the authorities
  • Restore your data and systems from known good backups

Ransomware

Informational