Malware Flashcards

1
Q

What is Malware?

A

Mal + Software, Software intentionally designed or deployed to have effects contrary to the best interests of one or more users. including potential damage related to resources, devices, or other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are way malicious payloads cause damage?

A
  1. System disruption
  2. Defacement of a publicly visible service
  3. Destruction of data
  4. Crashing a system
  5. Stealing data (“exfiltration”)
  6. Hidden malicious services to send spam, etc.
  7. Setting up backdoor access to a system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 main categories of Malware payloads?

A
  • Virus
  • Worm
  • Trojan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Virus?

A
  1. hides in stored code, propagates based on user action
  2. A malicious code or program written to alter the way a computer operates
  3. Designed to spread from one computer to another
  4. Operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Worm?

A
  1. hides in running code, propagates automatically, exploits vulnerabilities 2. Typically, use network to send copies of themselves without any user intervention 3. Try to replicate themselves onto other systems (self-replicating).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan?

A
  1. imitates legitimate software, typically propagated by attacker 2. Overt functionality -> the program works and appears to be normal, 3. Covert functionality -> the program violates the security policy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are types of Viruses?

A
  1. File infector virus
  2. Boot Sector virus
  3. Web scripting virus
  4. Browser hijacker
  5. Resident virus
  6. Polymorphic virus
  7. Macro virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 4 types of other malware?

A
  1. Spyware 2. Adware 3. Ransomeware 4. Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 5 types of Rootkit Malware?

A
  1. Hardware or Firmware Rootkit
  2. Boot-loader Rootkit.
  3. Kernel Rootkit
  4. Application Rootkit
  5. Memory Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 Malware Infection Vectors?

A
  • Security defects in software
  • Insecure design or user error
  • Homogeneity
  • Over privileged users and code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the security defects in Software?

A
  1. system security procedures
  2. internal controls
  3. Bugs, error mistakes from programs
  4. Backdoor Vulnerabilities, hidden functions.
  5. Zero day Vulnerabilities
  6. CVE – Common Vulnerabilities and Exposures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the infection vectors with Insecure design or user error?

A
  • social engineering with malicious link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Malware infection Vectors with Homogeneity?

A

when all computers in a network run the same operating system (MS Windows,
Apple OS X), upon exploiting one, one worm can exploit them all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the issues with Over Privilege as Malware Infection Vector?

A
  • Over Privilege user example: The normal user allowed to install any software and make system changes.
  • Over Privilege code example: Allow code executed by a user to access all rights of that user. Commonly exploited in Email-based malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was Stuxnet?

A
  • Discovered in 2010
  • Targeted specific part of Iran’s nuclear infrastructure
  • Designed to circumvent protection mechanisms
  • Complex malware with rootkits, worms, detection,
  • command and control module
  • A very high complexity requiring huge investment: 6+man years to develop
  • Developed by state actors.
  • Zero-day exploits (4 different ones actually)
  • Windows rootkit
  • Programmable Logic Controller (PLC) rootkit -
  • first ever! Antivirus evasion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is Malware detection hard?

A
  • Malware actively aims to evade detection,
  • It is not clear what triggers a malware
17
Q

What are the 2 types Malware analysis?

A
  • Static Analysis: Examine without running the malware
  • Dynamic Analysis: Run the malware and monitor its effect
18
Q

What are Malware Analysis: Evasion Techniques?

A
  • Packer; coders use packing w multiple layers to make it difficult
  • Process Hollowing; injecting malicious code into another process
  • Anti-Debug; if detected changes its behaviour or terminates
  • Anti-VM; adds virtualization detection into malware.
19
Q

How does using a VM protect a malware engineer against possible security risks?

A
  • A VM allows the engineer to debug the malware live with it infecting the host computer.
  • Virtual Machines are installed on top of a hypervisor, Therefore the virtual machine does not share the host operating system and is isolated from the host kernel
20
Q

What is a polymorphic virus?

A

A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self-encrypted virus designed to avoid detection by a scanner. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.

21
Q

What is a kernel in an operating system?

A

A Kernel is a program/central module at the core of the operating system that manages all the process and devices