Section 2: Malware Flashcards

1
Q

What is a malware?

A

Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.

  • Viruses
  • Worms
  • Trojans
  • Ransomware
  • Spyware
  • Rootkits
  • Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Virus?

A

A malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.

  • requires user’s action in order to reproduce and spread
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 10 types of viruses?

A
  1. Boot Sector Virus
  2. Macro Virus
  3. Program Virus
  4. Multipartite Virus
  5. Encrypted Virus
  6. Polymorphic Virus
  7. Metamorphic Virus
  8. Stealth Virus
  9. Armoured Virus
  10. Hoax Virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Boot Sector Virus?

A

Virus that is stored in the first sector of a hard drive and are loaded into memory upon boot up

  • difficult to detect
  • installed before OS boots up
  • need specific AV that looks for boot sector viruses to find it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Macro Virus?

A

Virus that is embedded into a document and is executed when the document is opened by a user

  • Word / Power Point / Excel
  • macros are not malicious by themselves, they are used to do many useful functions in short periods of time
  • Excel for example, can have a macro code that makes calculations faster. But because you can add code to that macro, bad guys can take advantage of this and add malicious code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Program Virus?

A

A virus that infects an executable or an application

  • Every time you open an application or execute the program, you load the virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Multipartite Virus?

A

Combination of Boot Sector virus and Program virus. Attaches itself to the boot sector and system files before attacking other files on the computer

  • allows for persistence
  • you can find the program virus within windows, but not find the boot sector. Every time you reboot, it will reinstall into windows again
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Encrypted Virus?

A

A virus that uses a cipher to encrypt its contents to avoid detection by any AV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Polymorphic Virus?

A

An advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

  • morphs the way its code looks so that a signature-based AV cannot detect it anymore
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Metamorphic Virus?

A

Virus that is able to rewrite itself entirely before it attempts to infect a file (advanced version of a polymorphic virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Stealth Virus?

A

It is a sub category of viruses who have mechanisms to stay undetected/protect themselves

  • Encrypted, Polymorphic, Metamorphic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Armoured Virus?

A

A virus that has a layer of protection to confuse a program or person analysing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Hoax Virus?

A

Not necessarily a virus, but instead you get a virus that is trying to trick a user into infecting their own machine

  • message or website popup
  • phone call from someone pretending to work for Microsoft (“follow these steps to remove virus”)
  • “install this type of software to get rid of the virus”
  • allowing remote access to your machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Worm?

A

A piece of malicious software, like a virus, but is able to replicate and spread without user interaction

  • they take advantage of security holes in OS
  • can move from victim to victim, network to network, and across the world
  • can cause disruption to network traffic and computing activities
  • can cause a system to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a Worm use within a system?

A
  • Computing power
  • Processing power
  • Memory
  • Network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Trojan?

A

Malicious software that is disguised as a piece of harmless or desirable software

  • they perform desired functions but then also a malicious function ontop
17
Q

What is a RAT?

A

Remote Access Trojan

  • provides the attacker with remote control of a victim computer and is the most commonly used type of trojan
18
Q

What is a Ransomware?

A

Malware that restricts access to a victim’s computer system until a ransom is received

  • uses vulnerabilities in your software to gain access and then encrypt your files
  • essentially blackmail and extortion
19
Q

What is a Spyware?

A

Malware that secretly gathers information about the user without their consent

  • installed from a website or 3rd party software
  • best case - goes through all the information on your system and build a profile about you
  • worst case - includes a key logger
  • best best case - it is just an Adware which displays advertisements based upon its spying on you
20
Q

What is a Key Logger?

A

Malware that captures the victims keystrokes and takes screenshots for the attacker

21
Q

What is an Adware?

A

Specific type of spyware that displays adverts to you based on what you searched for

22
Q

What is a Grayware (Jokeware)?

A

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences

  • not good or bad, just in the middle
  • example - crazy mouse, which makes your mouse jump around everywhere on your sceen
23
Q

What is a Rootkit?

A

Software designed to gain administrative level control over a system without being detected

24
Q

Which Ring level does the Rootkit sit?

A

Ring 1, or Ring 0 preferrably

25
Q

Which Ring can you find Kernel-Mode?

A

Ring 0

26
Q

Which Ring can you find User privileges?

A

Ring 3

27
Q

Which Ring can you find Administrator privileges?

A

Ring 1

28
Q

What does the Kernel-Mode control?

A
  • Sound cards
  • Monitors
  • Drivers etc
29
Q

What is a DLL?

A

Dynamic Link Library

30
Q

What does a DLL do?

A

It is a library that contains code and data that can be used by more than one program at the same time

31
Q

What is a DLL Injection?

A

A technique rootkits use to maintain their persistent control

  • inserting malicious code into a running process on a Win machine by taking advantage of DLL that are loaded at run time
32
Q

What is Driver Manipulation?

A

An attack that relies on compromising the kernel-mode device drivers that operate a privilege or system level

33
Q

What is a Shim?

A

Piece of software code that is placed between two components to intercept calls and redirect them.
The rootkit will allow an interception to happen between the Win OS and DLL and then redirect that code which includes the malicious code embedded within

34
Q

When are Rootkits activated?

A

Before booting up the operating system and are difficult to detect

35
Q

What is the best way to detect a rootkit?

A

Boot up from an external device, and then scan the internal hard drive of the infected device

36
Q

What is Spam?

A

Activity that abuses electronic messaging. Most commonly Email

  • email
  • texting
  • social media
  • broadcast media
  • instant messaging
37
Q

How can spammers exploit Organisations email servers?

A

By exploiting their Open Mail Relays to send messages

  • These servers can send emails on behalf of others. Spammers take advantage of that
38
Q

Which Law deems spamming illegal?

A

CAN-SPAM Act of 2003

  • Controlling the Assault of Non Solicited Pornography and Marketing Act
39
Q

What is SPIM (IAM SPAM)?

A

Spam over Instant Messaging

  • text messages
  • Facebook chat
  • chat room inside games