CH-5 Malware Flashcards

1
Q

How a Virus Spreads

A

Finds a network connection, then copies itself to other hosts on the network.

Mails itself to everyone in host’s address book.

Downloaded from a website link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

By definition, a computer virus is a program that self-replicates. Self-replication and rapid spread are the hallmarks of a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer virus does what?

A
  • Self-replicates
    – Spreads rapidly
    – May or may not have a malicious payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can a Trojan horse be crafted especially for an individual?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can a trojan horse spread like a virus?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does Microsoft send “security alerts”?

A

NO!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exemples of web pages that consistently give the latest, most reliable, most detailed information on virus outbreaks.

A

https: // www.technewsworld.com/ perl/ section/ viruses-malware/
https: // us.norton.com/ internetsecurity-malware-virus-faq.html?
https: // www.us-cert.gov/ publications/ virus-basics
http: // www.techrepublic.com/ pictures/ the-18-scariest-computer-viruses-of-all-time/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Logic Bombs work?

A

Scheduled to run when a specific condition is met
– The condition is often a date
– Could also be volume of traffic, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a virus spread?

A

Method 1: emails itself out to everyone in your email address book- most comon method, especially via MS Outlook.

Method 2: scan your computer for connections to a network and then copy itself to other machines on the network to which your computer has access.

Method 3: USB, CDs, DVDs, masking itself as a legitimate file. In such a case it’s calle a Trojan horse.

Method 4: A website infected with a virus, and when someone visits the website, that person’s computer becomes infected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the Antivirus software operate?

A

– Scans for virus signatures
■ Keeps the signature file updated

– Watches the behavior of executables
■ Attempts to access e-mail address book
■ Attempts to change Registry settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to remove Spyware?

A

■ Anti-virus software blocks some spyware
■ Ad-blockers can block additional spyware
■ Many specialized Spyware removal tools exist as well:
– Spybot Search & Destroy
– Malwarebytes Adwcleaner
– Adaware Antivirus
– Norton Power Eraser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

That can a Trojan Horse do?

A

Download harmful software from a website.
Install a key logger or other spyware on your machine.
Delete files.
Open a backdoor for a hacker to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tips for Avoiding Viruses

A
  1. Install anti-virus software and keep it up to date
  2. Do not open questionable email attachments
  3. Patch your operating system and applications
  4. Avoid questionable websites
  5. Avoid pirated software
  6. Backup your computer regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Variation: Man-in-the-Browser, how does it work?

A

Perpetrator installs a Trojan on a victim’s computer
■ Trojan monitors user’s web transactions as they occur in real time
■ Trojan can detect a page-load for a specific pattern in its targeted list
■ Captures and/or modifies data being entered into the browser
■ Does not need to simulate encrypted sessions

– Browser establishes a secure connection with a website as usual
– Trojan operates between your browser’s interface and you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Advanced Persistent Threats (APTs)

A

■ Highly organized and well-financed
■ Advanced techniques, not “script kiddies”
■ Ongoing over a significant period of time
■ Often carried about by nation states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Rootkits?

A

■ A collection of hacking tools that can:
– Monitor traffic and keystrokes
– Create a backdoor
– Alter log files and existing tools to avoid detection
– Attack other machines on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the most widely accepted and used virus scanners?

A

McAfee and Norton - best

Kaspersky and AVG - also good

18
Q

What do Trojan horses do?

A
  • Download harmful software
    – Install a key logger
    – Open a back door for hackers
19
Q

What does a virus do to a network?

A

Reduces the functionality and responsiveness of a network by exceeding the traffic load that a network was designed to carry.

20
Q

What is a Boot Sector Virus? How does it work?

A

Boot sector: As the name suggests, this type of virus infects the boot sector of the drive. Such viruses can be difficult for antivirus software to find because most antivirus software runs within the operating system, not in the boot sector.

21
Q

What is a Boot Sector Viruse?

A

A malicious programs that reside in your hard drive.
They infect your machine by replacing your Master Boot Record (MBR) or DOS Boot Sector with their code.

In some cases, boot sector viruses will encrypt the MBR.

The Master Boot Record is on the first sector of your hard drive and executes whenever you power on your PC. This means that even if you try to remove boot sector viruses using an antivirus, they get loaded back into your computer’s memory on your next boot.

The most common way that these malicious programs spread is through shared removable media.

22
Q

What is a Botnet?

A

A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection.

23
Q

What is a Macro Virus?

A

Macro viruses infect the macros in office documents. Many office products, including Microsoft Office, allow users to write mini-programs called macros. These macros can also be written as a virus. A macro virus is written into a macro in some business application. For example, Microsoft Office allows users to write macros to automate some tasks.

24
Q

What is a Memory Resident virus? How does it work?

A

A memory-resident virus installs itself and then remains in RAM from the time the computer is booted up to when it is shut down.

25
Q

What is a Memory-Resident Virus?

A

A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the ‘host’ application or program has stopped running (been terminated).

  • load its replication module into memory so it does not need to be executed for it to infect other files,
  • activating whenever the operating system loads or operates specific functions.
  • may be one of the worst kinds
  • it can even attaching itself to anti-virus applications which allows it to infect any file scanned by the program.
26
Q

What is a Metamorphic Virus? How does it work?

A

Metamorphic: A metamorphic virus is a special case of the polymorphic virus that completely rewrites itself periodically. Such viruses are very rare.

27
Q

What is a Multi-Partite virus? How does it work?

A

Multi-partite viruses attack the computer in multiple ways, for example, infecting the boot sector of the hard disk and one or more files.

28
Q

What is a multipartite virus?

A

It uses file infectors or boot infectors to attack the boot sector and executable files simultaneously.
The multipartite virus can affect both the boot sector and the program files at the same time, thus causing more damage than any other kind of virus.

When the boot sector is infected, simply turning on the computer will trigger a boot sector virus because it latches on to the hard drive that contains the data that is needed to start the computer. Once the virus has been triggered, destructive payloads are launched throughout the program files.

29
Q

What is a Polymorphic Virus? How does it work?

A

Polymorphic: A polymorphic virus literally changes its form from time to time to avoid detection by antivirus software.

30
Q

What is a scareware?

A

The MacDefender virus was first seen in the early months of 2011, and variations are still seen today.

It is embedded in some web pages, and when a user visits those web pages, she is given a fake virus scan that tells her she has a virus, and it needs to be fixed.

The “fix” is actually downloading a virus. The point of the virus is to get end users to purchase the MacDefender “antivirus” product. This is the second reason this case is noteworthy. Fake antivirus attacks, also known as scareware, have been becoming increasingly common.

31
Q

What is a software patch?

A

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes.

32
Q

What is a Sparse infector virus? How does it work?

A

Eludes detection by performing its malicious activities only sporadically.

The user will see symptoms for a short period, then no symptoms for a time. In some cases the sparse infector targets a specific program but the virus executes only every 10th time or 20th time that target program executes. Or a sparse infector may have a burst of activity and then lie dormant for a period of time. There are a number of variations on the theme, but the basic principle is the same: to reduce the frequency of attack and thus reduce the chances for detection.

33
Q

What is a sparse infector?

A

A virus that infects only occasionally (e.g. every tenth program executed), or only files whose lengths fall within a narrow range, etc.
By infecting less often, such viruses try to minimize the probability of being discovered.

34
Q

What is a Virulent Virus?

A

The term virulent means essentially the same thing in reference to a computer virus as it does in relationship to a biological virus: It is a measure of how rapidly the infection spreads and how easily it infects new targets.

35
Q

What is an Armored Virus? How does it work?

A

A computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult.

  • fooling anti-virus software into believing that the virus is resides somewhere other than its real location - implemented by adding complicated and confusing code to mask the virus and prevent virus researchers from creating an effective countermeasure.
36
Q

What is Buffer Overflow?

A

Attackers exploit buffer overflow issues by overwriting the memory of an application.

This changes the execution path of the program, triggering a response that damages files or exposes private information. For example, an attacker may introduce extra code, sending new instructions to the application to gain access to IT systems.

37
Q

What is CERT?

A

Computer Emergency Response Team (CERT).

CERT (www.cert.org) is an organization hosted at Carnegie Mellon University that is a repository for security bulletins, information, and guidelines. CERT is a source that any security professional should be familiar with.

38
Q

What is Ransomware?

A

A form of malware (viruses and Trojans).

Entire operating system or individual files are encrypted.

39
Q

What is Spyware used for?

A

Legal Uses:
– Monitoring employees
– Monitoring children’s computer use
– Monitoring customers via cookies (in some countries)

■ Illegal Uses:
– Deployed covertly for malicious purposes
– Violation of the Children’s Online Privacy Protection Act

40
Q

What is the common theme with all virus attacks?

A

They want you to open some type of attachment.

41
Q

What is the Polymorphic Virus?

A

“shape shifting” virus produces malicious code that replicates itself endlessly and repeatedly changes its characteristics.

42
Q

What Spyware do you know?

A

– Web cookies
– Key loggers
– Screen capture