Chapter 2 Type of Attack Indicators Flashcards
Crypto-Malware
- Malware that uses a system’s resources to mine cryptocurrency.
- Theft of services attack uses CPU cycles of someone else’s computer to do crypto mining.
How are Trojans used to attack a system?
- A standalone program that must be copied and installed by an authorized user.
- Appears to do one thing but hides some other functionality.
Worm
- Pieces of code that attempt to penetrate network and computer systems.
- This can survive on its own.
Logic Bomb
- A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload.
Ransomware
- Malware that typically encrypts files on a system and then leaves them unusable or temporarily until a ransom is paid.
Spyware
- Usually installed without the user’s knowledge.
- Can record activities such as keyloggers.
Spraying
- An attack that uses a limited number of commonly used passwords and applies them to a large number of accounts.
Potentially Unwanted Programs (PUP)
A way for companies and antivirus vendors to identify programs that may have adverse effects on a computer’s security or privacy.
Fileless Virus
- Memory-based attack, hard to detect.
- A piece of malware operates only in memory, never touches the filesystem.
Backdoor
- Programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system.
- Common backdoors include: Netbus and Back Orifice.
Man in the Middle Attack
A mechanism whereby an attacker can inject himself into middle of a conversation between two devices.
Command and Control
- Used to control malware that has been launched against targets.
Rainbow Tables
Precomputed tables or hash values associated with passwords.
Dictionary
Another method of determining passwords is to use a password-cracking program that uses a list of dictionary words to try to guess the password.
Hybrid Cloud
- One where elements from private, public, and community cloud structures are combined.
- Environments not joined together but are used together.
Remote Access Trojans (RATs)
A toolkit designed to provide the capability of court surveillance and/or the capability to gain unauthorized access to a target system.
Bots
- A functioning piece of software that performs some task, under the control of another program.
- Bots can proliferate spam to commit fraud, install spyware, and other malicious acts.
Keyloggers
- Piece of software that logs all of the keystrokes that a user enters.
- Used to obtain passwords and other sensitive pieces of information.
Rootkit
- Specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality.
Brute Force
- Attempting all password combinations
- The length of the password can affect the time a brute force attack will take.
Offline Brute Force Attack
- Can be employed to perform hash comparisons against a stolen password file.
Online Brute Force Attacks
- Can occur against a system in real time.
- Frequently done to attack a single account with multiple examples of passwords.
Malicious Universal Serial Bus (USB) Cable
- Cables embedded with malicious devices such as Wi-Fi devices, enabling attacks against a Wi Fi network.
Skimming
- Physical devices built to collect all credit card information as well as the pin number being entered.