1.2 Malware & common attacks Flashcards

1
Q

What is a malware?

A

malicious software, can aim at gather information or take control of your computer and make it a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different type of malware?

A
  • viruses
  • crypto-malware
  • worms
  • trojan horse
  • rootkit
  • keylogger
  • adware/spyware
  • botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to get a malware?

A

can be dl via a click on an email, or via web page pop up, or via a vunerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

a malware that can reproduce itself through file systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the different virus type ?

A
  • program viruses (in applications)
  • boot sector viruses (when the OS boot)
  • script viruses
  • macro viruses (inside a macro in microsoft office)
  • fileless virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a fileless virus?

A

type of malware that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, making it hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How fileless malware work?

A

1/user click on malicious website link
2/ website exploit a vulnerability
3/ launch powershell and dl payloads in RAM
4/ run powershell script and exec in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a worm?

A

type of malware that self replicated and self spread through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How a worm can be detected?

A

by a firewalls and IDS/IPS before the infection, the worm should be signature based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ransomware?

A

malware that employs encryption to hold a victim’s information at ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is crypto malware?

A

same as ransomware, the data are encrypted and the ransom needs to be paid if you want the data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect against ransomware

A
  • have a backup
  • update OS
  • update apps
  • update antivirus/malware to get the latest signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is trojan horse?

A

software that pretend to be something else and in reality you are installing a malware, once it is inside in can open backdoor or dl file etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a PUP

A

Potentially Uwanted Software that can be dl by a trojan (eg agressive browser toolbar, unwanted ad etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a backdoor?

A

can be open thans to a malware. It is a undocumented way of gaining access to a computer without having to redo the whole attack for the hacker. SOme software like Linux includ backdoor to the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent a trojan?

A
  • update antivirus with the lates signature
  • have a backup
  • don’t click on unknown link
17
Q

What is a rootkit?

A

type of malware that give access and modify file on the kernel (and not the OS), it can be invisible

18
Q

Is a rootkit can be identified?

A

yes some antivirus can and software that secure boot exists

19
Q

what is a spyware?

A

type of malware that steals sensitive info and gather data. It can analyse the activity on internet and use keylogger to capture credential once the victim log in a website. It can be install via a trojan

20
Q

how to protect against spyware/adware?

A
  • antivirus/anti malware with latest signature
  • know exactly what you are installing
  • do backups
21
Q

What are bots?

A

type of malware that infects a device to make it a bot remotely contolled by the hacker

22
Q

what is botnets ?

A

a group of bots working toghether. It can be used to do DDos, relay spam, proxy network traffic

23
Q

How to prevent for bot ?

A
  • update OS
  • update antivirus/malware
  • identify an existing infection
  • prevent command and control (block at firewall, IPS)
24
Q

what is a logic bomb?

A

type of malware that is triggered when a logical condition is met such as after a number of transactions have been processed, or on a specific date. Difficult to spot cos logic bomb can delete themselves and no signature predefined in antivirus

25
How to prevent from logic bomb?
- Formal change control & procedure (is there a process in place for change in the server?) -host based intrusion dection - constant auditing of systems
26
What is the best way to store a password?
by hashing that it irreversible
27
what is a spraying attack (this is not malware)
when an attacker uses common passwords to attempt to access several accounts on one domain. Using a list of common weak passwords, such as 123456 or password1, an attacker can potentially access hundreds of accounts in one attack. it avoid the account to be locked
28
What is a bruteforce attack?
try every possible password combination until the hash matches the password' hash. It can be detected and the account can be locked
29
What is a dictionnarry attack ?
use a dictionary to find common words, many wordlists are available on the internet
30
What is a rainbow table?
an optimized, pre-built set of hashes stored in a table and help to find hashes corresponding to a password
31
what is "adding a salt"
it refers to adding random data to a password when hashing so that it can be easily unshash via a rainbow table, it slow the bruteforce attack (e.g. password +MeNvg)
32
What are the different type of physical attacks?
- malicious USB cable: cable which perform unwanted function once connected (dl malware, data exfiltration, gps tracking etc). Often detected as mouse or keyboard by computer - malicious usb flash drive: USB infected with malware that are dl once connected to pc - skimming: stealing credit card info during a normal transaction - card cloning: cloning a credit card
33
what is poisoning the training data attack?
it is a type of attack directed to machine learning. As ML require a lot to data for the AI to function,, an attacer can confuse the AI by sending modified data
34
What is the difference between cloud based and on premises attack?
- cloud: security is centralized and costs less - onpremises: security and infra cost on the client
35
what are cryptographic attacks?
- collision: 2 plaintext created the same hash value - downgrade attack: scenario in which a malicious actor attempts to force a server or client to use a lower version of a cryptographic protocol (such as TLS or SSL), a cipher suite (such as an export-grade cipher, instead of a standard one), or a connection type (HTTP, instead of HTTPS)