Malware Attacks Flashcards
Ransomware
Form of malware designed to encrypt the files on device rendering them to unusable. Files are with unique extension assigned to malware. After encryption on the screen you can se instruction how to pay
Bloat ware
Unwanted and potentially harmful software preloaded onto new devices. Also known as potentially unwanted applications (PUA - type of code)
Logic bomb
Code with execute when certain event or different time occurs
Memory resident
Malware stays resident in memory upon execution and can infect other programs running on the same time
Rootkit
Computer program designed to provide continued, privileged access to a computer while actively hiding its presence
Stealth
Malware technique, malware is designed to be inconspicuous in order to avoid detection by concealing file size or moving to alternate location
Malware
Malicious software, used for steal info, harm/disrupt operations, weaponize devices
Virus
Malicious code whose primarily function is to replicate and deliver its payload (what is designed for)- requires a host.
Polymorphic malware evades pattern
Matching detection by frequent changing identifiable characteristics like file name, file type or encryption key
APT advanced persistent threat
Sophisticated, slow stealthy and prolonged attack with the intention to compromise system and gain information from or about the target
C2 - command and control attack
Object is for the compromised system to contact “command center” which gives the attacker control of the infected device
PUA potentially unwanted applications
Type of unwanted code, also known as bloatware. This software is unwanted and potentially harmful software preloaded onto new devices
Spyware
Is a software with malicious behavior that aims to gather information about the person, organization and send it to another entity
Bot/zombie
Automated processes that either have instructions or listen for instructions
Backdors
Code designed to bypass access controls