Threats, Vulnerabilities, Attacks Flashcards
Worm
- Malicious software, like a virus, but is able to replicate itself without user
interaction
-> Worms self-replicate and spread without a user’s consent or action
-> Worms can cause disruption to normal network traffic and computing
activities
-> Example
• 2009: 9-15 million computers infected with conficker
Virus
*Malicious code that runs on a machine without the user’s knowledge and
infects the computer when executed
*Viruses require a user action in order to reproduce and spread
Trojan Horse
- Malicious software that is disguised as a piece of harmless or desirable software.
- Trojans perform desired functions and malicious functions.
RAT
Remote Access Trojan:
- Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan.
Ransomware
- Malware that restricts access to a victim’s computer system until a ransom is received
- Ransomware uses a vulnerability in your SW to gain access and then encrypts your files.
(Example: $17 million: SamSam cost the City of Atlanta)
Spyware
Spyware is malware that secretly gathers information about the user without their consent.
*It captures keystrokes made by the victim and takes screenshots that are sent to the attacker
Adware
Displays advertisements based upon its spying on you
Grayware
Software that isn’t benign nor malicious and tends to behave improperly without serious consequences
Rootkits
Rootkit is SW designed to gain administrative level control over a system without detection.
DLL injection is commonly used by toolkits to maintain their persistent control.
Rootkits are activated before booting the operating system and are difficult to detect
DLL
A type of Rootkit where malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.
Driver Manipulation
A type of Rootkit attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level
*A shim is placed between two components to intercept calls and redirect them.
Spam
Spam is activity that abuses electronic messaging systems, most commonly through email.
**Spammers often exploit a company’s open mail relays to send their messages.
***CAN-SPAM Act of 2003
Summary of Malware (name some)
- Virus
- Worm
- Trojan
- Ransomware
- Spyware
- Rootkit
- Spam
Where does Malware usually start?
Typically, Malware infections start within SW, messaging, and media
Watering Holes
Watering Holes is a method of a Malware attack:
Malware is placed on a website that you know your potential victims will access.