MOD7: Malware Threats Flashcards
What’s the difference between trojans and viruses?
Trojans - infect systems
Viruses - infect files
What is malware?
malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware creator for the purpose of theft / fraud
List examples of malware.
Trojans backdoors rootkits ransomware adware viruses worms spyware botnets crypters
What 3 malware components are meant to make code undetected?
Crypter
Obfuscator
Packer
What is a payload?
A piece of software that allows control over a computer system after it has been exploited.
What are APTs?
Advanced Persistent Threats.
APTs are defined as a type of network attack, where an attacker gains unauthorized access to a target network and remains undetected for a long period of time.
Their main objective is to gain sensitive information rather than sabotaging the organization/network.
What is a Trojan?
A program in which the malicious or harmful code is contained inside apparently harmless programming or data in such a way that the code can get control and cause damage.
How do hackers use Trojans?>
- delete/ replace OS
- generate fake traffic
- download malware/spyware /malicious files
- record screenshots etc
- create backdoors to gain access
- disable firewalls /antivirus
- steal personal info
- encrypt data
What port does Emotet use?
20/22/80/443
What port did WannaCry and Petya use?
445
Name types of Trojans.
Remote Access Trojan (RAT) Backdoor Trojan Botnet Trojan Rootkit Trojan E-banking Trojan Point-of-Sale Trojan Defacement Trojan Service Protocol Trojan Mobile Trojan IoT Trojan Security Software Disabler Trojan Destructive Trojan DDoS Attack Trojan Command Shell Trojan
Attackers use covert channels to deploy and hide malicious trojans in an undetectable protocol.
True/False.
True.
Covert channels operate on a tunneling method and are mostly employed by attackers to evade firewalls that are deployed in the target network.
Port 443 is encrypted.
True/False.
True.
Which one is a Trojan technique for evading antivirus software?
a) break the trojan file into multiple pieces and zip them as a single file.
b) always write your own trojan, and embed it into an application.
c) change the Trojan’s syntax (ex. convert an EXE to VB script, change .EXE extension to a known extension)
d) all of the above
d) all of the above
Note: never use trojans from the web. Antivirus detects it.
What is an exploit kit?
a platform to deliver exploits and payloads such as trojans, spywares, backdoors, bots, and buffer overflow scripts to the target system.
Exploits come with pre-written exploit codes and can be easily used by an attacker, who is not an IT / security expert.