Sec+ Chapter 03: Malicious Code Flashcards

1
Q

RAT

A

Remote access Trojan

Attackers use these for remote access and monitoring of systems

Challenging to detect because legit tools can be used as RATs

Antimalware can return false positives, but you can’t turn detection off or you risk RATs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Malicious software intentionally designed to harm systems, devices, networks, users, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware

A

Malware that takes over a computer and demands a ransom

EX: Crypto malware that encrypts all files and only decrypts after you pay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware defense

A

An effective backup system that stores files in a separate location, ideally one that won’t be impacted if the system, or device it’s backing up is infected and encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

Malware designed as legit software

Attackers rely on users running them to gain access into a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan and RAT defense

A

Security awareness

Don’t dl untrusted software

Antimalware tools to detect behaviors and known files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms

A

Malware that spreads itself without the need for user interaction

EX: Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

Malware that allows attackers access to a system through a backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit defense

A

Test the suspected system from a trusted device

Integrity checking and data validation

Antirootkit tools

Constant backups, patch often, user secure configs

Once detected, you have to rebuild the system or restore from known good backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoors

A

Provides access to bypass normal authentication and authorization procedure

Often used in conjunction with Trojans and rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Backdoor defese

A

Routine checks for open ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bots

A

Remotely controlled systems or devices infected with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Botnet

A

Groups of bots

Relies on HTTPS traffic to help hide C2 from monitoring and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

C2 / C&C

A

Command and control

Systems that control bots and botnets

Usually client-server mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

P2P botnet control

A

Connects bots directly to each other

Uses encrypted P2P traffic

Exceptionally difficult to identify and take down central server, C2 IPs, or domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fast Flux DNS

A

Where botnets use many IPs to answer queries for one or more fully qualified DNS name

Frequent updates (fast flux) means hosts reg and dereg address every few min

17
Q

Bot and botnet detection

A

Use network traffic analysis systems (IDS, IPS)

ID underlying malware with antimalware

Take down domain name

18
Q

DDoS

A

Distributed Denial of Service

Attack often made through botnets, many devices to cause service to be unavailable

All bots send queries to overwhelm apps and services

19
Q

Botnet DDoS defense

A

SIEM systems to monitor for big increases in legit traffic

Monitor network traffic trends constantly

Behavioral analysis tools

20
Q

Keyloggers

A

Malware that captures keystrokes, mouse movement, touchscreen input, credit card swipes, etc

21
Q

Keylogger defense

A

Security awareness

Antimalware

Patch management

MFA / 2FA

22
Q

Logic bomb

A

Functions of code place inside programs that activate when certain conditions are met

23
Q

Fileless virus

A

Virus that spreads by spam email and malicious sites to exploit flaws in browsers and plugins

Once in, they inject into memory

Don’t require local file storage because they’re memory-resident

24
Q

Fileless virus defense

A

Update all browser plugins and software

Antimalware

IPS and reputation-based protection systems to avoid malicious sites

25
Q

Spyware

A

Malware designed to obtain info about an individual, org, or system

Reports findings back to central servers

EX: Browsing habits, installed software, webcam activity, etc

26
Q

Spyware defense

A

Antimalware

Security awareness

27
Q

PUP

A

Potentially unwanted program

Not very dangerous, more annoying

EX: Adware, browser toolbars, etc

28
Q

PUP defense

A

Antimalware

Limit what software can be installed

Security awareness

29
Q

PowerShell

A

Built in Windows scripting language

Takes normal cmd and extends function to manage almost every aspect of Windows OS

Popular target for attack because of its powerful capabilities

EX: remote and local execution, network access, exe from CLI, etc

30
Q

PowerShell hardening and defense

A

1) Constrained language mode: Limits sensitive ps1 commands

2) Window’s Defender Application Control or AppLocker: Validates scripts, limits modules and plugins

3) PowerShell logging

31
Q

VBA

A

Virtual basic for applications

Powerful programming language that interacts with the OS

MS Office macros written in VBA, used to be hit all the time but now disabled

32
Q

Adversarial AI

A

Growing field where attackers use AI for malicious purpose