Malware definitions Flashcards
This type of malware looks legitimate, but can take control of a computer. It is designed to damage, disrupt, steal or inflict some harmful action on our data or network. To operate, this type of malware will create numerous processes to run in the background of a system.
Trojan
This is the most common type of trojan and allows an attacker to control a workstation or steal information remotely
Remote Access Trojan (RAT)
This type of malware is designed to deny access to a computer system or data until a ransom is paid. It sypically spreads through phishing emails or by unknowlingly visiting an infected website. Once infected, a system or its files are encrypted, and then the decryption key is withheld from the victim unless payment is received.
Randsomware
This is a clandesine coputer program designed to provide continued privileged access to a computer while actively hiding its presence. It is generally a collection of tools that enable administrator-level acces to a computer or network.
Rootkit
This malware actively attemps to steal confidential information by capturing the data when entered into the computer by a user. It records keystrokes entered into a web browser or other appication.
Keylogger
This is the fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information. The key to is that the attackm is focused on a targeted set of people, not just an indiscriminate large group of random people.
Spear phishing
This is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
This is when the vendor is aware of a security flaw, but a patch has not been developed or applied on an affected system. At this point, a malicious actor can craft an attack and take advantage of the failure of the vendor.
zero-day vulnerability
This is a type of attack that disguises a communication from an unknown source as being from a known, trusted source. It can occur using different methods, such as MAC addresses, IP addresses, phone call numbers, and others.
Spoofing