Modern Malware Flashcards
Which of the following viruses are classified by concealment?
a. Macrovirus
b. Encrypted virus
c. Polymorphic virus
d. Metamorphic virus
e. B, C, D
f. All of the above
e. B, C, D
T/F: Improper handling of user input can lead to SQL injection.
True
T/F: Metamorphic viruses are harder to detect than polymorphic viruses
True
What is software called that collects information from the computer and transmits it to another system, monitoring keystrokes, network traffic and on the screen data
a. Spammer programs
b. Keylogger
c. Spyware
d. Trojan horse
c. Spyware (page 185 and lecture slides)
For each of the below, select whether the statement describes Spamming, Click Fraud, or Phishing:
a. Used by botmasters to fraudulently increase revenues from advertisers
b. Used to gather valuable financial information.
c. Infected machines send out unsolicited emails
a. used by botmasters to fraudulently increase revenues from advertisers?
Answer: Click Fraud
b. Used to gather valuable financial information.
Answer: Phishing
c. Infected machines send out unsolicited emails
Answer: spamming
List some examples of attacks and frauds by botnets:
Spam DDOS Clickfraud Phishing and pharming Key logging Key/password cracking Anonymized terrorist and criminal communication Cheating in online games/polls
T/F: In DDOS attacks, the attacker does not have to use his own computer in the attack
True
T/F: In a DDOS attack, the quantity of computers involved in the attack makes it difficult to distinguish legitimate from malicious traffic
True
T/F: The characteristics of DNS servers help mitigate the effect of DDOS attacks.
False
In C&C, how can the bot master contact the compromised machines (bots) and use them?
The naive approach is to have victims contact the botmaster. This is insufficient because it can be easily defeated via ISP intervention, blackhole routing, etc…
What are good Botnet C&C Design considerations from an attacker perspective?
a. Efficient and reliable: able to reach a sizable set of bots within a time limit
b. Stealthy: hard to detect (blended with normal/regular traffic)
c. Resilient: hard to disable or block
T/F: Bots have more sophisticated communication capabilities than worms and viruses.
True
T/F: Bots require direct communication with the C&C server before beginning an attack.
False
T/F: Bots require direct communication with the C&C server before beginning an attack.
False. Bots may include conditions such as time to trigger an attack.
T/F: A botnet will be less likely to be found if it uses custom communication protocols.
False. Custom communications protocols more easily detected
How do we distinguish between bots vs worms/viruses?
The ability to perform C2 is a characteristic of bots, not worms or viruses
What are some ways we can deal with botnet DNS lookups once we have identified a domain (i.e. hackerz.com) as a botnet master?
GT sinkhole: when a bot/victim makes a DNS request for hackerz.com, the DNS server responds with the ip address of a GT sinkhole.
In addition to canceling communication from/to bot master, this approach allows researchers to inspect the ip of infected machines
What do the following APT attacks do?
a. Boy in the Browser
b. Clickjacking
c. Man in the Browser
d. Man in the Middle
e. Keyloggers
a. Boy in the Browser: covertly changes a computer’s network routing
b. Clickjacking: web users unknowingly click on something that is not as it is portrayed
c. Man in the Browser: modifies web pages covertly
d. Man in the Middle: eavesdrops
e. Keyloggers: covertly records keystrokes