Malware Flashcards
Malware
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
Threat Vector
method used to infiltrate a victim’s machine
examples:
- USB drive installation
- unpatched software
- phishing campaigns
Attack Vector
Means by which the attacker gains access and infects the system
- combines infiltration method and infection process
Viruses
Computer virus made up of malicious code that’s run on a machine without the user’s knowledge and this allows the code to infect the computer whenever it has been run
- attach to clean files, spread and corrupt host files
10 Types of Viruses
- Boot sector
- Macro
- Program
- Multipartite
- Encrypted
- Polymorphic
- Metamorphic
- Stealth
- Armored
- Hoax
Boot Sector Virus
stored in the first sector of a hard drive then loaded into memory whenever the computer boots up
Macro Virus
code that allows a virus to be embedded inside another document so when opened by user, virus is executed
Program Virus
Try to find executables or application files to infect with their malicious code
Multipartite Virus
combo of boot sector and program; place itself in boot sector and can load every time computer boots; can install itself in a program where it can be run at computer startup
Encrypted Virus
hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software
Polymorphic Virus
advanced encrypted virus; also changes the viruses code each time it is executed by altering the decryption module to evade detection
Metamorphic Virus
Able to rewrite themselves entirely before it attempts to infect a given file
Stealth Virus
Technique used to prevent the virus from being detected by the anti-virus software
Armored Virus
Have a layer of protection to confuse a program or a person who’s trying to analyze it
Hoax Virus
Form of technical social engineering that attempts to scare our end usersinto taking some kind of undesirable action on their system
Worms
Standalone programs replicating and spreading to other computers without any user interaction or consent
- Known for spreading far and wide over internet in short time
Danger:
- Infects your workstation and other computing assets
- Cause disruptions to your normal network traffic since they try to replicate across network
Trojans
Disguise as a legitimate software, grant unauthorized access; claims it will perform some needed or desired function for you
commonly used today to exploit:
- a vulnerability in your workstation -
- conduction data exfiltration
- create backdoors to maintain persistence on your system
- etc.
Remote Access Trojan (RAT)
Widely used by modern attackers because it provides the attacker with remote control of a victim machine
Ransomware
Encrypts user data, demands ransom for decryption
Prevent
- Always conduct regular backups
- Install software updates regularly
- provide security awareness training to users
- MFA
How to address a ransomware attack?
Never pay the ransom
- disconnect device from network
- notify the authorities
- Restore your data and systems from known good backups
Botnets
network of compromised computers or devices controlled remotely by malicious actors
Used:
- as pivot points
- disguise the real attacker
- host illegal activities
- spam others by sending out phishing campaigns and other malware
- most commonly used for DDoS attacks
- combine processing power to break through encryption schemes
Zombies
Name of a compromised computer or device that is part of a botnet
- used to perform tasks using remote commands from the attacker without the user’s knowledge
- Attackers use about 20-25 percent of any zombies power
Command and Control Node (C2 Node)
Computer responsible for managing and coordination the activities of other nodes or devices devices within a network
Rootkits
Hide presence and activities on a computer, operate at the OS/root/administrative level
- OS is blind to them
Detect :
- boot from an external device and scan the internal HD to ensure you can detect the rootlets using a good anti-malware scanning solution from live boot Linux distribution