Malware Flashcards
What is Malware?
Mal + Software, Software intentionally designed or deployed to have effects contrary to the best interests of one or more users. including potential damage related to resources, devices, or other systems.
What are way malicious payloads cause damage?
- System disruption
- Defacement of a publicly visible service
- Destruction of data
- Crashing a system
- Stealing data (“exfiltration”)
- Hidden malicious services to send spam, etc.
- Setting up backdoor access to a system
What are the 3 main categories of Malware payloads?
- Virus
- Worm
- Trojan
What is a Virus?
- hides in stored code, propagates based on user action
- A malicious code or program written to alter the way a computer operates
- Designed to spread from one computer to another
- Operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
What is a Worm?
- hides in running code, propagates automatically, exploits vulnerabilities 2. Typically, use network to send copies of themselves without any user intervention 3. Try to replicate themselves onto other systems (self-replicating).
What is a Trojan?
- imitates legitimate software, typically propagated by attacker 2. Overt functionality -> the program works and appears to be normal, 3. Covert functionality -> the program violates the security policy.
What are types of Viruses?
- File infector virus
- Boot Sector virus
- Web scripting virus
- Browser hijacker
- Resident virus
- Polymorphic virus
- Macro virus
What are 4 types of other malware?
- Spyware 2. Adware 3. Ransomeware 4. Rootkit
What are the 5 types of Rootkit Malware?
- Hardware or Firmware Rootkit
- Boot-loader Rootkit.
- Kernel Rootkit
- Application Rootkit
- Memory Rootkit
What are the 4 Malware Infection Vectors?
- Security defects in software
- Insecure design or user error
- Homogeneity
- Over privileged users and code
What are the security defects in Software?
- system security procedures
- internal controls
- Bugs, error mistakes from programs
- Backdoor Vulnerabilities, hidden functions.
- Zero day Vulnerabilities
- CVE – Common Vulnerabilities and Exposures
What are the infection vectors with Insecure design or user error?
- social engineering with malicious link
What are the Malware infection Vectors with Homogeneity?
when all computers in a network run the same operating system (MS Windows,
Apple OS X), upon exploiting one, one worm can exploit them all.
What are the issues with Over Privilege as Malware Infection Vector?
- Over Privilege user example: The normal user allowed to install any software and make system changes.
- Over Privilege code example: Allow code executed by a user to access all rights of that user. Commonly exploited in Email-based malware
What was Stuxnet?
- Discovered in 2010
- Targeted specific part of Iran’s nuclear infrastructure
- Designed to circumvent protection mechanisms
- Complex malware with rootkits, worms, detection,
- command and control module
- A very high complexity requiring huge investment: 6+man years to develop
- Developed by state actors.
- Zero-day exploits (4 different ones actually)
- Windows rootkit
- Programmable Logic Controller (PLC) rootkit -
- first ever! Antivirus evasion