Malware Flashcards
Threat Vector
specific method used by an attacker to infiltrate a machine
Attack Vector
how and the way an attacker will infect your system
Virus
malicious software attached to clean files to spread throughout the system
Worm
standalone malware programs that replicate and spread to other systems exploiting software vulnerabilities
Trojans
disguised as legitimate software that allow unauthorized access when executed
Ransomware
encrypts user’s data and holds it hostage until a ransom is paid
Botnet
network of zombies and often used in DDOS attacks
Zombies
compromised computers that are remotely controlled by hackers and perform the task of the botnet
Rootkits
tasks that hide their activities and operate at the OS level for ongoing privileged access
Backdoor
malicious means of bypassing normal authentication processes to gain unauthorized access
Logic Bombs
embedded code placed in legitimate programs that executes a malicious action when a specific condition is met
Key loggers
records a user’s keystrokes and used to capture passwords
Spyware
secretly monitors and gather information or activities
Bloatware
unnecessary or pre-installed software that consumes system resources
Malware Exploitation Techniques
involves methods in which malware infiltrates and infects systems
Boot-sector Virus
stored in the first sector of a hardrive and is loaded into memory whenever the OS boots up
Macro Virus
a form of code that allows a virus to be embedded in another document and executed when the document is opened
Program Virus
tries to find executable or application files to infect with their code
Multipartite Virus
a combination of boot sector viruses and program viruses
Encrypted Virus
hides itself from detection by leaving the malicious code/payload encrypted
Polymorphic Virus
the encrypted virus but changes the code scheme every time its executed
Metamorphic Virus
able to rewrite itself entirely before it attempts to infect a file
Stealth Virus
the technique itself of preventing virus from detection
Armored Virus
layer of protection to confuse a person/program from analyzing it