Viruses and Worms Flashcards
Virus
Malware that can reproduce itself.
Needs end user to execute a program that starts the replication process.
Needs a human to start the process.
Uses existing file system or network to replicate.
-Can delete files
-Encrypt files
-Put advertising on system
-Gather info from your PC
Worm
Malware that needs no human interaction.
Can jump from machine to machine.
Takes advantage of existing vulnerabilities and connectivity between local systems.
Can infect 100,000,000s or millions of systems in a short period.
Anti-virus
Software purposely installed on PC.
Recognizes virus.
Stops it from starting and executing.
Updated “signatures” allow anti-virus to recognize new viruses and stop them.
Program Virus
One category of virus.
Part of an application that is running.
Clicking / launching app causes it to execute.
Boot Sector Virus
Rare virus
Exists in Boot sector of storage device.
Starting up or booting PC launches virus.
Once OS starts, virus is started.
Script Viruses
Can operate in OS or browser.
Macro Virus
Usually runs in another application.
Commonly involves MS Office apps.
A Stealth Attack
Fileless, never installs itself or saves itself as a file system on PC.
New style of virus.
Can sometimes avoid anti-virus detection if anti-virus is looking at what gets saved to storage drive because virus does not save itself.
Operates in memory of PC.
Once started all operations happen in RAM.
Never writes to storage drive on PC.
Executed by clicking links on websites or emails.
Typically run as flash or java file.
Can take advantage of Windows Vulnerabilities to execute.
Can then run script in another app, such as PowerShell which will download script from a 3rd party website and execute file.
What can a stealth attack do?
Run:
Scripts
Executables in memory
Exfiltrate data
Damage files
Add auto-start to registry.
How to stop worm.
Identify worm
Create signature
Set up Firewall or IDS/IPS to mitigate between two systems.
Not helpful if worm is already on system
WannaCry Worm
Occurred Friday, May 12, 2017
Propagated automatically.
Installed crypto malware to begin encrypting personal files.
Took advantage of a vulnerability in MS Server Message Block v1 or SMB v1
Used exploit, Eternal Blue, to find other systems on network and infect them.
Once new PC was exploited, back door was installed called Double Pulsar which would download Wannacry and then encrypt files on new PC.
Process begins again on new PC.