Viruses and Worms Flashcards

1
Q

Virus

A

Malware that can reproduce itself.

Needs end user to execute a program that starts the replication process.

Needs a human to start the process.

Uses existing file system or network to replicate.

-Can delete files
-Encrypt files
-Put advertising on system
-Gather info from your PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Malware that needs no human interaction.

Can jump from machine to machine.

Takes advantage of existing vulnerabilities and connectivity between local systems.

Can infect 100,000,000s or millions of systems in a short period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-virus

A

Software purposely installed on PC.
Recognizes virus.
Stops it from starting and executing.
Updated “signatures” allow anti-virus to recognize new viruses and stop them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Program Virus

A

One category of virus.
Part of an application that is running.
Clicking / launching app causes it to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Boot Sector Virus

A

Rare virus
Exists in Boot sector of storage device.
Starting up or booting PC launches virus.
Once OS starts, virus is started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Script Viruses

A

Can operate in OS or browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Macro Virus

A

Usually runs in another application.
Commonly involves MS Office apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Stealth Attack

A

Fileless, never installs itself or saves itself as a file system on PC.
New style of virus.
Can sometimes avoid anti-virus detection if anti-virus is looking at what gets saved to storage drive because virus does not save itself.

Operates in memory of PC.
Once started all operations happen in RAM.
Never writes to storage drive on PC.

Executed by clicking links on websites or emails.

Typically run as flash or java file.
Can take advantage of Windows Vulnerabilities to execute.

Can then run script in another app, such as PowerShell which will download script from a 3rd party website and execute file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can a stealth attack do?

A

Run:
Scripts
Executables in memory
Exfiltrate data
Damage files

Add auto-start to registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to stop worm.

A

Identify worm

Create signature

Set up Firewall or IDS/IPS to mitigate between two systems.

Not helpful if worm is already on system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WannaCry Worm

A

Occurred Friday, May 12, 2017

Propagated automatically.
Installed crypto malware to begin encrypting personal files.

Took advantage of a vulnerability in MS Server Message Block v1 or SMB v1

Used exploit, Eternal Blue, to find other systems on network and infect them.

Once new PC was exploited, back door was installed called Double Pulsar which would download Wannacry and then encrypt files on new PC.

Process begins again on new PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly