Section 3: Malware Infections Flashcards
How does malware delivery happen?
Through
- software
- messaging & media
- botnet or zombies
- active interception (puts malware into your network, MITM)
- privilege escalation
- back doors
- logic bombs
Easiest delivery
- USB (physical access)
What are the two Vectors a malware uses to access a machine?
- Threat Vector
- Attack Vector
What is a Threat Vector?
It is the potential method an attacker can use to access a victims machine.
- unpatched software
- installation from USB
- phishing campaign
Remember house scenario
- no gate
- open window etc
What is an Attack Vector?
It is the method an attacker uses to gain access to a victims machine in order to infect it with malware
What are the key differences between Threat Vector & Attack Vector?
Threat Vector - potential way to get to the machine
Attack Vector - the actual way you got into the machine and how you will infected it
Common Delivery Methods of Malware Infections
Software, Messaging, Media
Software & Messaging
- email programs
- peer to peer networks (bit torrent)
- ftp servers
Media
- CD/DVD
- USB
- External HDD
- Tape backups
- Floppy Disks
What is the Watering Hole concept?
When a malware is placed on a website that you know your potential victims will access.
Social media - people always come back for more
What is Type Squatting?
When an attacker purchases a similar domain, pretends that the website is legit by making it look like the real one, and infecting it with malware
- DionTraining.com
- DionTraining(s).com
One is illegitimate but if you do not pay attention you will think its the same
What is a Botnet?
Collection of compromised computers under the control of a master node
What is a Zombie?
A single infected computer part of a botnet
What is a master node in a Botnet?
It is the Command and Control (C2) computer that controls hundreds of thousands of infected computers
What is a Pivot Point?
When an attacker is using your computer to look like the attack is coming from you rather than their own system
- Command & Control (C2) -> Zombie -> victim
- can use zombies to host illegal files such as CP
- can use zombies to spam people and send out phishing campaigns
- DDoS (most common)
What is a DDoS?
Distributed Denial of Service
- sending requests/packets to overload a server and make it slow or crash it making it inaccessible to users/customers
What is a common use of Botnets now?
To earn money. Bitcoin/Crypto Mining which is processor intensive
What are Botnets great for?
Processor intensive functions & activities
- crypto mining
- breaking encryptions
What is an Active Interception?
When a computer is placed in-between the sender and receiver resulting in capturing and/or modifying the traffic between them
What is Privilege Escalation?
When you use a design flaw exploit or a bug in a system to gain access to resources that a normal user isn’t able to access
- Going from a regular user to an admin
What is a Backdoor?
It is a piece of software/code that lets you bypass normal security and authentication functions
- bad security practice
- breach of good secure coding practices
What is something that acts like a backdoor?
Remote Access Trojan (RAT)
- gives persistent access
What is an Easter Egg?
Non-malicious code that when invoked displays an insider joke, hidden message or secret feature
- harmless
- additional code which could have additional vulnerabilities
What is a Logic Bomb?
Malicious code that has been inserted inside a program and will execute only when certain conditions have been met
- employ plants this code inside server’s code which will delete everything if he is removed from payrole
What do the Secure Coding Standards say about Easter Eggs and Logic Bombs?
They should not be used!
What are some symptoms of an infected system?
- Slow (worms use network & processor resources to spread and replicate)
- pc locking up/crashing/BSOD
- restarting/crashing
- Hard drives & files are not accessible anymore
- strange noises
- unusual error messages
- Display looks strange
- Jumbled printouts
What is double file extensions such as textfile.txt.exe a sign of?
Malware infection