Topic 13A Flashcards
Malware
Software that serves a malicious purpose, typically installed without the user’s consent (or knowledge).
Trojan
refers to malware concealed within an installer package for software that appears to be legitimate. This type of malware does not seek any type of consent for installation and is actively designed to operate secretly.
Potentially unwanted programs (PUPs)/Potentially unwanted applications (PUAs)
software installed alongside a package selected by the user or perhaps bundled with a new computer system. Unlike a Trojan, the presence of a PUP is not automatically regarded as malicious. It may have been installed without active consent or with consent from a purposefully confusing license agreement.
Also known as grayware and bloat ware
The payload
an action performed by the malware other than simply replicating or persisting on a host. Examples of payload classifications include spyware, rootkit, remote access Trojan (RAT), and ransomware.
Virus
Aims to replicate and spread from computer to computer infecting files and programs
is executed only when the user performs an action such as downloading and running an infected executable process, attaching an infected USB stick, or opening an infected document with macros or scripting enabled.
Non-resident/file infector virus
is contained within a host executable file and runs with the host process. The virus will try to infect other process images on persistent storage and perform other payload actions. It then passes control back to the host program.
Memory resident virus
when the host file is executed, the virus creates a new process for itself in memory. The malicious process remains in memory, even if the host process is terminated.
Boot
the virus code is written to the disk boot sector or the partition table of a fixed disk or USB media and executes as a memory-resident process when the OS starts or the media is attached to the computer.
Script and macro viruses
the malware uses the programming features available in local scripting engines for the OS and/or browser, such as PowerShell, Windows Management Instrumentation (WMI), JavaScript, Microsoft Office documents with Visual Basic for Applications (VBA) code enabled, or PDF documents with JavaScript enabled.
multipartite
is used for viruses that use multiple vectors
polymorphic
used for viruses that can dynamically change or obfuscate their code to evade detection.
computer worm
is memory-resident malware that can run without user intervention and replicate over network resources
can execute by exploiting a vulnerability in a process when the user browses a website, runs a vulnerable server application, or is connected to an infected file share
rapidly consume network bandwidth as the worm replicates
may also be able to crash an operating system or server application, performing a denial of service attack
can carry a payload that can be written to perform any type of malicious action.
Fileless malware
does not write its code to disk. The malware uses memory-resident techniques to run in its own process, within a host process or dynamic link library (DLL), or within a scripting host. There is still disc activity. It just changes registry values to achieve persistence
Uses lightweight shellcode to create a backdoor. This is easy to obfuscate to avoid detection. Can download additional packages while obfuscating them.
may use “live off the land” techniques rather than compiled executables to evade detection. This means that the malware code uses legitimate system scripting tools, notably PowerShell and Windows Management Instrumentation (WMI), to execute payload actions. Once this happens they have all the tools they need.
Bloatware and malware can be used for different levels of monitoring:
Tracking cookies - is a plaintext file, not malware, but if permitted by browser settings, third-party cookies can be used to record web activity, track the user’s IP address, and harvest various other metadata
Supercookies and beacons - A supercookie is a way of storing tracking data in a non-regular way, like saving it to the cache without flagging as a cookie. A beacon is a single pixel image embedded in a website that, while invisible, will request to download. This allows the beacon to collect data.
Adware - bloatware that performs browser reconfigurations, such as allowing tracking cookies, changing default search providers, opening sponsor’s pages at startup, adding bookmarks, and so on
Spyware - malware that can perform adware-like tracking, but also monitor local application activity, take screenshots, and activate recording devices, such as a microphone or webcam. Can perform DNS redirection
Keylogger - spyware that actively attempts to steal confidential information by recording keystrokes. The attacker will usually hope to discover passwords or credit card data.
remote access Trojan (RAT)
is backdoor malware that mimics the functionality of legitimate remote control programs, but is designed specifically to operate covertly