1.0 - Threats, Attacks and Vulnerabilities Flashcards
Code is changing after each use, so that signature-based scanning does not always work.
Type of threat?
Polymorphic Malware
Code is encrypted so that it cannot be decomplied or reverse engineered.
Type of threat?
Armored Virus
Files are encrypted, either permanently or until a ransom is paid.
Type of threat?
Crypto-Malware
Files are encrypted, and request for ransom is received.
Type of threat?
Ransomware
Malicious code that attaches itself to another piece of executable code. It only runs when the executable it is attached to is run.
Type of threat?
Virus
Malicious code that spreads across a network without being attached to another executable. Can also move via email, open network shares, IIS, SQL. Type of threat?
Worm
Software that appears to do one thing, such as a game, but also has embedded malicious code.
Type of threat?
Trojan
Threat that modifies the OS, often by re-writing the kernel.
Type of threat?
Rootkit
Malicious code that records keystrokes.
Type of threat?
Keylogger
Software that makes ads appear. Can be malicious or legitimate.
Type of software?
Adware
Software that monitors a user’s activities, including: keylogging, browsing, cheating on games, software usage.
Type of software?
Spyware
A large number of infected PCs that can be controlled by one malicious user.
Type of threat?
Botnet
A hacker installs a toolkit on a remote PC that lets them record keystrokes, take screenshots, install software, see and change system settings.
What is this toolkit called?
RAT (Remote-Access Trojan)
An administrator installs a piece of code that will delete files or do other damage if they are fired.
What is this called?
Logic Bomb (or Time Bomb if it will go off a specific number of days later)
A developer is able to get back into a system even after new layers of security have been added.
What method did they use.
Backdoor / Trapdoor. Often a hard-coded password, which is difficult to remove.
List common Indicators of Compromise (IOC)
Common IOCs are:
Network:
- Unusual outbound network traffic
- Geographical irregularities in network traffic
- HTML response sizes
- Mismatched port-application traffic
- Unusual DNS requests
- Signs of DDoS activity
- Web traffic with nonhuman behavior
Accounts:
- Anomalies in privileged user account activity
- Account login red flags
OS & Applications:
- Increase in database read volumes
- Large number of requests for the same file
- Suspicious registry or system file changes
- Unexpected patching of systems
- Mobile device profile changes
- Bundles of data in the wrong place
A threat returns even after the OS is wiped and reloaded while the system is air-gapped.
Likely type of threat?
Firmware Rootkit, possibly in a video card or expansion card firmware.
This threat loads before the OS, as a virtualization layer for the OS. This allows it to intercept hardware calls to the OS.
Virtual Rootkit or Vitual Machine-Based Rootkit (VMBR).
This type of threat operates at the OS level, giving it priviledged access to the system.
Kernal Rootkit
This type of threat infects libraries, such as .DLL files, so they can execute inside a target process to spoof it, or overwrite the memory of the target application.
Library Rootkit
Any threat will attack at least one of the three security requirements (the CIA of security). These are?
Confidentiality
Integrity
Availability
A user receives an email indicating that they need to login to resolve an account issue at a website.
What type of threat is this?
Phishing
Members of just the accounting team receive emails asking them to login to the corporate bank account, with an invalid link.
What type of attack is this?
Spear Phishing
The CEO receives a ficticious email or phone call, which was tailored just for her. What type of attack is this?
Whaling