Virus and Malware Types Flashcards
Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed
Virus
Type of virus that is stored in the first sector of a hard drive and loaded into memory upon boot
Boot Sector Virus
Type of virus that is embedded into a document and executed when the document is opened by the user
Macro Virus
Virus that infects an executable or program
Program Virus
Combination of boot sector and program virus - loads itself upon boot and can install itself in a program. Gives persistence and redundancy to the virus
Multipartite Virus
Advanced encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection
Polymorphic Virus
Virus that is able to rewrite itself entirely before it attempts to infect a file - advanced version of polymorphic
Metamorphic Virus
Virus that has a layer of protection to confuse a program or person analyzing it
Armored Virus
Social Engineering that fakes a virus/infection in order to convince a user to run a program that contains actual malware
Hoax Virus
Virus that uses encryption to protect itself
Encrypted Virus
Malware that self-replicates without user interaction
Worm
Type of malware that is disguised as a piece of harmless or desired software
Trojan
Malware that holds a user’s data/system hostage by restricting access until payment is given by user
Ransomware
Malware that secretly gathers information on a user without consent
Spyware
Malware designed to gain administrative level control over a system without detection.
Rootkit
Activity that abuses electronic messaging systems, mostly email
Spam
Taking advantage of a misspelled URL and directing the user to a potentially malicious page
Typosquatting
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers or to unknowingly install malware
Phishing
Phishing involving voice calls
Vishing
A type of phishing that targets an important individual like the CEO of an organization
Whaling
type of phishing campaign that targets a specific person or group and often will include information known to be of interest to the target, such as current events or financial documents.
Spear Phishing
Phishing through text messages
Smishing
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages.
Botnet
Mechanism used to bypass normal authentication and security functions
Backdoor
Remote access trojans (RATs) are malware designed to allow an attacker to remotely control an infected computer.
RAT - Remote Access Trojan
Malicious code that has been inserted inside a program and will execute only when certain conditions are met
Logic Bomb
What is PUP
Potentially Unwanted Program- not specifically defined as malware (think of mac keeper)
A malware-infected network host under remote control of a hacker is commonly referred to as:
Bot
A technique used by certain types of malware to cause an error in a program and make it easier to run malicious code.
Buffer Overflow
An older type of computer virus which doesn’t alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension.
Companion Virus
A type of Trojan designed to transfer other malware onto a PC via Internet connection.
Downloader
A computer virus that actively attacks an antivirus program in an effort to prevent detection.
Retrovirus
A computer program not explicitly classified as malware by an antivirus software.
PUP