Malware Flashcards

1
Q

What are the TWO components that every piece of malware has?

A

1) Propagation Mechanism

2) Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe what the “propagation mechanism” component of malware is

A

How malware spreads from one system to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe what the “payload” component of malware is.

A

The malicious action that the malware performs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the defining characteristics of a VIRUS?

A

It spreads from system to system based on some type of user action.
Examples: Opening e-mail attachments, clicking on a link to a malicious website, inserting infected USB into workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best way to defend against a VIRUS?

A

User education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the defining characteristics of a WORM?

A

They spread from system to system without any user interaction. They reach out and exploit system vulnerabilities, infecting systems without the user doing anything. Once a worm has infected a system, it uses that system as a new base for spreading to other parts of the local area network, or the broader intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best way to defend against a WORM?

A

The best way to defend against worms is keeping systems updated with the most recent operating system and application patches. This is because they require vulnerable systems to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the defining characteristics of a TROJAN?

A

They pretend to be legitimate pieces of software that a user might want to download and install. When the user runs the program, it does perform as expected, however the Trojan horse also carries a malicious hidden payload that performs some unwanted action behind the scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best way to defend against a TROJAN?

A

Application control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the defining characteristics of REMOTE ACCESS TROJANS (RATs)?

A

They are a special class of Trojan horse that serve a specific purpose. They provide hackers with the ability to remotely access and control infected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is application control?

A

Limiting the software that may run on systems to titles and versions specifically approved by the administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Main characteristics of VIRUSES, WORMS, and TROJANS.

A

VIRUS - Spreads between systems after a user action.
WORM - Self replicating.
TROJAN - Pose as legitimate software with a hidden malicious effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three different types of malware payloads?

A

Adware, Spyware, and Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the ADWARE payload.

A

Malware used for the purpose of displaying advertisements, but instead of generating revenue for the content owner, the revenue goes to the malware author.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the mechanisms of ADWARE?

A
  • Changing the default search engine
  • Displaying pop-up advertisements
  • Replacing legitimate ads on websites with ones that benefit the malware author
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the SPYWARE payload.

A

Malware that gathers user info without their knowledge or consent and then reports it back to the malware author to use.
Examples: Identity theft, access to financial accounts, espionage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Different techniques of SPYWARE.

A
  • Keystroke loggers
    + Captures every key a user presses
  • Web browser monitoring
    + Used to target advertising to the user or report on user activity
  • Search hard drive and/or cloud storage
    + Seeks out sensitive info like social security numbers to be used in identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the RANSOMWARE payload.

A

Blocks the use of a computer or data until a ransom is paid, most commonly by encrypting files and selling the key for ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the top 3 methods for preventing malware on a computer or system?

A

1) Installing and keeping an up to date anti-malware software
2) Installing security patches as early as possible
3) Educating end users on the dangers of malware

20
Q

What makes BACKDOORS and LOGIC BOMBS different than other types of malware?

A

Instead of being independent programs used to deliver a malicious payload, they are pieces of code inserted into other applications with malicious intent.

21
Q

What is a BACKDOOR?

A

When a programmer provides a means to grant themselves or others future access to a system, usually with benevolent purposes.

22
Q

What are some common occurrences that create a BACKDOOR?

A
  • Hard-coded accounts with a specific username and password that will always grant access to the system
  • Default passwords a user may not remember to change
  • Unknown access channels, where there’s a way to gain access to a system without going through the normal authentication process.
23
Q

What is a LOGIC BOMB?

A

Malware that is set to execute a payload when certain conditions are met.
Examples: When a specific time and date occurs, the contents in a file contain certain information, or the results of an API call.

24
Q

What are 3 examples of advanced malware concepts?

A

Rootkits, polymorphism, and armored viruses.

25
Q

What is the root account?

A

Special superuser account on a system that provides unrestricted access to system resources and is normally reserved for system administrators.

26
Q

What is the current definition of a ROOTKIT?

A

A software technique that is designed to hide other software on a system.

27
Q

What were ROOTKITS originally designed for?

A

Privilege escalation.

28
Q

What are the types of payloads that a ROOTKIT can deliver?

A

Backdoors, botnet agents, adware, or spyware.

29
Q

What are some non-malicious examples of ROOTKIT usage?

A

Anti-theft mechanism, user mode rootkits, kernel mode rootkits

30
Q

Whats the difference between a USER MODE ROOTKIT and a KERNEL MODE ROOTKIT?

A
User Mode Rootkit
 - Run with normal user privileges
 - Easy to write and difficult to detect
Kernel Mode Rootkit
 - Run with system privileges
 - Difficult to write and easy to detect
31
Q

What is SIGNATURE DETECTION in reference to anti-malware software?

A

The software recognizes viruses by maintaining a database of known virus patterns and then comparing suspected files to that database.

32
Q

What is a POLYMORPHIC VIRUS?

A

Viruses that change themselves constantly. The virus will not look the same from one system to another due to using encryption and a different encryption key on each system they infect. and since the signature will not match, signature detection will not work.

33
Q

What technique to antivirus researches use to help detect a POLYMORPHIC VIRUS?

A

Reverse engineering.

34
Q

In reference to antivirus detection, describe the technique of REVERSE ENGINEERING.

A

When the programmers go deep into the virus in order to analyze the machine language or assembly code that make up its DNA.

35
Q

What is an ARMORED VIRUS?

A

A virus that uses sophisticated techniques in order to avoid detection and prevent reverse engineering.

36
Q

What are some techniques that ARMORED VIRUSES use to avoid detection?

A

Writing the virus in obfuscated assembly language that hides the codes true intent, blocking the use of system debuggers, and preventing the sandboxing technique, which can isolate the virus

37
Q

In terms of computer security, what is a SANDBOX?

A

Security mechanism for separating running programs in an effort to mitigate system failures or software vulnerabilities from spreading.

38
Q

What are the major characteristics of ROOTKITS, POLYMORPHIC VIRUSES, AND ARMORED VIRUSES?

A

ROOTKITS - Hide other software installed on the system
POLYMORPHIC VIRUS - Change themselves often to avoid detection by antivirus software
ARMORED VIRUS - Use sophisticated techniques to hide themselves from virus detection mechanisms.

39
Q

What is a BOTNET?

A

A collection of zombie computers used for malicious purposes, or a network of infected systems.

40
Q

What is a ZOMBIE computer?

A

A computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombies do not realize that they are being used in such a way.

41
Q

How do hackers give orders to all the infected systems on the botnet?

A

Using indirect and redundant command and control mechanisms

Examples: Internet Relay Chat (IRC), Twitter accounts, peer-to-peer communication with the botnet itself

42
Q

What are the 6 steps that lead to a system becoming part of a BOTNET?

A

1) System is infected with malware
2) The infected system becomes part of the botnet
3) The now infected system spreads the infection to other systems, increasing the size of the botnet.
4) The systems check in with the botnet owner through a command and control network in order to receive instructions
5) The infected systems then execute the instructions
6) After execution, the payload is delivered (Ex: delivering spam or conducting a DDoS attack)

43
Q

What is a ZERO-DAY VULNERABILITY?

A

When a new vulnerability is discovered, but instead of sharing it with the vendor or the world, the researcher simply holds onto it and preserves the vulnerability as a secret weapon used to gain access to systems.

44
Q

What is the WINDOW OF VULNERABILITY?

A

The time between when a new vulnerability is discovered and a patch is released for it.

45
Q

What type of attacker is known to use attacks involving ZERO-DAY VULNERABILITIES?

A

Advanced Persistent Threats (APTs)

46
Q

What is an Advanced Persistent Threat (APT)?

A

Highly skilled and well funded attackers, usually a military unit, government intelligence agency or other highly organized group carrying out a focused attack.