Threat, Vulnerabilities and Mitigations: Indicators of Malware Attacks Flashcards
What are malware attacks?
There are many types of malware:
Ransomware
Worm
Trojan
Spyware
Bloatware
Virus
Keylogger
Logic bomb
Rootkit
What signs do you need to look out for malware attacks?
Poor Performance
HIgh Resource Utilization
Random System Crashes
Unusual Network Activities
Malicious software binaries
Disabled Security controls
Malicious user accounts
Missing modified files
What are some indicators of poor performance?
Slow mouse and/or keyboard response
Slow network response
Slow file Read/Write
What are some indicators of high resource utilizations?
CPU
Memory
Disk
Network
What are some indicators of Random system crashes and restarts?
Logic Bombs
What are some indicators of Malicious software binaries?
Keyloggers
Bloatware
Spyware
Remote access Trojan (RAT)
Webshells
What are some indicators of unusual network activities?
Check out all the network connections via:
netstat
Wireshark
tcpdump
What are the indicators of Disabled security controls?
Antivirus, endpoint detection and response (EDR), and extended detection and response (XDR)
Firewalls: Have they been disabled?
What are the inidicators of malicious user accounts?
Identifying malicious user accounts in cybersecurity involves looking for various indicators that suggest suspicious or harmful behavior. Here are some common indicators:
-
Unusual Login Patterns:
- Logins from multiple geographic locations in a short time span.
- Access attempts outside normal business hours.
- Use of anonymizing proxies or VPNs to hide the source of logins.
-
Failed Login Attempts:
- High number of failed login attempts, indicating potential brute force attacks.
- Repeated use of incorrect or old passwords.
-
Account Activity:
- Sudden changes in the frequency or type of activity on an account.
- Access to resources or data that the user typically doesn’t interact with.
- Large volumes of data being downloaded or uploaded.
-
Behavioral Anomalies:
- Actions that deviate significantly from the user’s normal behavior patterns.
- Attempting to access restricted areas or data.
-
Security Alerts:
- Triggers from security systems like IDS/IPS indicating suspicious activity.
- Antivirus or anti-malware software detecting threats.
-
Email and Communication Patterns:
- Sending phishing emails or large volumes of unsolicited emails.
- Use of command and control servers for communication.
-
Privileged Account Abuse:
- Unauthorized elevation of privileges.
- Access to admin-level functions or tools without a legitimate reason.
-
IP Address Anomalies:
- Logins from IP addresses associated with known malicious activity.
- Rapid switching of IP addresses during a session.
-
Device Anomalies:
- Access from unknown or unauthorized devices.
- Changes in the device used for access, such as new browsers or operating systems.
-
Data Exfiltration:
- Unusual data transfers, especially to external destinations.
- Use of non-standard ports or protocols for data transfer.
-
Account Creation Patterns:
- Creation of multiple accounts in a short period.
- Use of similar or random-looking usernames and email addresses.
-
Audit and Log Analysis:
- Discrepancies or gaps in logs that might indicate tampering.
- Correlation of logs across systems revealing suspicious patterns.
Using a combination of these indicators, cybersecurity teams can better detect and respond to malicious activities, helping to protect systems and data from compromise.
What are indicators of missing or modified files?
Encrypted?
Ransomware?
Large file missing or tampered or change