Worms Flashcards

1
Q

What is a worm in cybersecurity?

A

A self-replicating malware that spreads autonomously across networked devices, often exploiting vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three characteristics of worms.

A
  1. Self-replication.
  2. Network-based spread.
  3. Exploitation of vulnerabilities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the BRAIN virus, and how did it spread?

A

The first IBM PC virus, spread by copying itself into the boot sector of floppy disks and marking the sector as faulty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What made the Morris Worm notable?

A

It propagated aggressively due to a bug, using buffer overflow attacks and caused damages of $10-100 million.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How did CodeRed propagate and what were its payloads?

A

Exploited MS-IIS server overflow, defaced websites, and later launched DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why was SQL Slammer so effective?

A

It exploited a connectionless UDP service, fit entirely in a single packet, and infected 75,000 hosts in 10 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was unique about STUXNET?

A

It targeted industrial control systems, disrupting Iran’s nuclear centrifuges with sophisticated zero-day exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key steps in worm propagation?

A
  1. Identify a vulnerable target (e.g., via IP scanning).
  2. Exploit the vulnerability.
  3. Transfer and execute the worm code on the target.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How did CodeRed V1 propagate?

A

By randomly scanning the entire 32-bit IP address space with the same pseudorandom number seed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name two advanced worm propagation techniques.

A
  1. Localized scanning: Preferentially targeting nearby IP addresses.
  2. Hit-list scanning: Starting with a predefined list of likely-successful targets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is worm spread modeled?

A

Using the “Susceptible-Infectible” (SI) model with parameters:
N: Population size.
S(t): Susceptible hosts at time t.
I(t): Infected hosts at time t.
β: Contact rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What influences the contact rate β?

A

Scanning speed.
Target population size.
Prevalence of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can worm activity be measured?

A

By monitoring indiscriminate network scanning behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are rootkits and how do they work?

A

Malicious code that hides from detection by intercepting system calls or patching the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can rootkits be detected?

A

Using tools like rootkit revealers that compare disk state offline versus through system calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the impact of STUXNET?

A

It damaged 1,000 of Iran’s 5,000 nuclear centrifuges and is considered the first prominent example of cyber warfare.

17
Q

What techniques did STUXNET use?

A

Exploited four zero-day vulnerabilities.
Installed signed device drivers to avoid detection.
Overwrote programmable logic boards.

18
Q

How are worms used in DDoS attacks?

A

They propagate widely to create botnets that overwhelm targets with traffic.

19
Q

How have worms influenced economic pursuits?

A

Zero-day exploits are now commodities sold in markets, influencing cybercrime and cyber warfare.

20
Q

Why are worms described as “The Wild West”?

A

The constant technological arms race between detection and evasion.