PM - Section 1.1 Malware Flashcards

1
Q

Name some malware types

A
Viruses
Crypto-malware (used to encrypt all your data)
Ransomware
Worms
trojan horse
Rootkit
Keylogger
Adware/Spyware
Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you get malware?

A

Exploits a vulnerability and installs a remote access backdoor.
Your computer must execute a program - email link, popup, drive by download, worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

Can be propagate from device to device and replicate. Reproduces through file systems or network. Many are invisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some types of viruses?

A

Program viruses - part of application.
Boot sector viruses
Script viruses - OS based and browser based
Macro viruses - common in MS office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a worm?

A

A worm is a type of virus that can move itself from one computer to another. No human interaction needed. Uses network as a transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to stop a worm?

A

Firewalls
IDS/IPS can mitigate worms effects.
Intrusion Prevention System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the WannaCry worm?

A

Affects Windows systems. Looks for a vulnerable system installs EternalBlue. EB installs a backdoor and downloads WannaCry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ransomware?

A

Computer is locked and encrypted until you pay for a ransom. Can be fake and just be a splash screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is crypto-malware?

A

Encrypts all data files, but OS still works until you pay for the decryption key. (A public key cryptography)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to avoid a crypto-malware attack?

A

Have a backup of your files off line. Keep OS up-to-date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Trojan Horse?

A

Pretends to be something else. Doesn’t replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a backdoor?

A

Opens up a channel to allow other malware to get in. Any software could have a backdoor!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a RAT?

A

Remote Access Trojans/ Remote Administration Tools

Downloaded with other software and allows allows admin control. E.g. Key logger, screen-recordings, copy files, install more malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a RootKit?

A

Unix/Linux devices. It modifies the kernel of the OS. Antivirus/anti-malware software cannot find it. It’s invisible to the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Zeus/Zbot malware?

A

Famous for cleaning out bank accounts.

Now combined with a RootKit - and the rootkit would prevent you from deleting Zbot.

17
Q

How to protect against RootKit attacks?

A

Very difficult.
Use a rootkit remover if you find one.
Secure boot with UEFI Bios..?

18
Q

What is a keylogger?

A

Saves all keystrokes to a file to grab passwords/emails etc. Circumvent encryption protections.

19
Q

How do you prevent keyloggers

A

Use anti-malware.
Firewalls to watch for file transfers.
Keylogging scanner.

20
Q

What is Adware and Spyware?

A

Popups that slow down you computer. Makes your computer one big advertisement.

Spyware watches what you are doing - identity theft. Poses as fake security software.

21
Q

Why is there so much Adware/Spyware?

A

Money

  • Advertising is valuable
  • Could hijack and use you CPU
  • Spy and find your bank account
22
Q

How to protect against Adware/Spyware?

A

Update antivirus/malware software.

Runs scans e.g. malwarebytes

23
Q

What is a Botnet?

A

A computer is infected with a virtual robot. Enters through a trojan horse or OS or app vulnerability.

Waits for commands from the main system. Utilizes DDos through the power of many.

You can rent time one the botnets to target a website to make something inaccessible for a set amount of time.

24
Q

What is the ZeuS botnet?

A

Waited for you to log into bank, then transferred credentials to hackers.

25
Q

How can you see all the active botnets?

A

map.lookingglasscyber.com

26
Q

How can you prevent a botnet?

A

Keep everything up-to-date.

Prevent C&C Command and Control - Bots log into chatrooms to wait for commands from the central server.
Block the chatroom at the firewall

27
Q

What is a logic bomb?

A

Malware that waits for a predefined event, often based on time or maybe a backup process.
Often left by someone with a grudge who had admin access.

28
Q

How do you prevent a logic bomb?

A

They are very difficult to recognize.
Create processes/procedures with a formal change control
Monitor changes - create alerts and use software like Tripware to track changes.