Sec+ Chapter 03: Malicious Code Flashcards
RAT
Remote access Trojan
Attackers use these for remote access and monitoring of systems
Challenging to detect because legit tools can be used as RATs
Antimalware can return false positives, but you can’t turn detection off or you risk RATs
Malware
Malicious software intentionally designed to harm systems, devices, networks, users, etc
Ransomware
Malware that takes over a computer and demands a ransom
EX: Crypto malware that encrypts all files and only decrypts after you pay
Ransomware defense
An effective backup system that stores files in a separate location, ideally one that won’t be impacted if the system, or device it’s backing up is infected and encrypted
Trojan
Malware designed as legit software
Attackers rely on users running them to gain access into a system
Trojan and RAT defense
Security awareness
Don’t dl untrusted software
Antimalware tools to detect behaviors and known files
Worms
Malware that spreads itself without the need for user interaction
EX: Stuxnet
Rootkit
Malware that allows attackers access to a system through a backdoor
Rootkit defense
Test the suspected system from a trusted device
Integrity checking and data validation
Antirootkit tools
Constant backups, patch often, user secure configs
Once detected, you have to rebuild the system or restore from known good backup
Backdoors
Provides access to bypass normal authentication and authorization procedure
Often used in conjunction with Trojans and rootkits
Backdoor defese
Routine checks for open ports and services
Bots
Remotely controlled systems or devices infected with malware
Botnet
Groups of bots
Relies on HTTPS traffic to help hide C2 from monitoring and analysis
C2 / C&C
Command and control
Systems that control bots and botnets
Usually client-server mode
P2P botnet control
Connects bots directly to each other
Uses encrypted P2P traffic
Exceptionally difficult to identify and take down central server, C2 IPs, or domains