Malware Flashcards

1
Q

How is malware classifed

A

How it spreads and the payload, as if they need a host program/are independent and whether it replicates or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Kit

A

A toolkit which provides a variety of payloads that novices can deploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Sources

A

Pollitically motivated, criminals, organised crime, organisations that sell services, national gov agenices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APTS Meaning

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APTS Definition

A

Persistent use of variety of intrusion tech to selected targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APTS Characteristics

A

Advanced (wide variety of tech), persistent (attacks over extended period of time), threats (active involvement of people increases threat liklihood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aim of APTS?

A

From stealing Intellectual property to disrupting a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APTS techniques

A

Social engineering, spear phishing, drive by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intent of APTS?

A

to infect target and use other tools to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

Malware which infects a program and modifies to include a copy. Secretely run when the host program is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus Components

A

Infection Mechanism (Vector), Trigger (Logic Bomb), Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus Phases

A

Dormant, Triggering, Propagation, Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Triggering Phase

A

Virus is activated caused by system events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dormant Phase

A

Virus is idle. will be activated. not all have this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Propagation Phase

A

Places a copy in programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Execution Phase

A

Function is performed, may be harmless or damaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Macro + Scripting Viruses

A

Attaches itself to documents and uses macro programming capabilities of documents application to execute and propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are macro viruses threatening

A

Platform dependent, infect documents not code, easily spread, traditional file access system control struggles to find them, much easier to write/modify than traditional viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virus Classifications

A

By Target, By Concealment strategy

20
Q

Break down Virus Classifications by target

A

Boot sector Infector, File Infector, Macro virus, Multi-partite Virus

21
Q

Break down Virus Classifications by concealment strategy

A

Encryption, Stealth, Polymorphic, Metamorphic

22
Q

What are Worms

A

Seeks more machines to infect. Infected machines serve as an auto launch pad. Exploits software vulnerabilites

23
Q

How do worms spread

A

Network Connections, Shared media, macro code in emails & instant messanger file transfer. Upon activation worm replicates and propagates.

24
Q

Worm Target Discovery

A

Scanning, Random, Hit-list, topological, local subnet

25
Worm Technology
Multi-platform, multi exploit, ultrafast speading, polymorphic, metamorphic
26
Mobile Code
Transmitted from a remote system to a local system and executed there. Often acts as a mechanism for a virus, worm, trojan.
27
How is mobile code achieved
Cross site scripting, interative and dynamic websites, email attachements, downloads from untrusted sites
28
Drive By Download
Webpage installs virus without user knowing
29
Watering Hole Attack
variant of drive by download but targetted for a victim
30
Malvertising
Malware on website in advertisements without comprimising them
31
Clickjacking
Collecting a users clicks, can alter UI to add hidden buttons to redirect user
32
Social Engineering
Tricking users to comprimise their own system
33
How is Social Engineering achieved
Spam - Bulk Email, used for phishing, Trojan Horse, Ransomware
34
Attack Agent Bots
Takes over another internet attached computer and uses to launch/manage attacks. Uses DDoS, spamming, sniffing, keylogging
35
Remote Control Facility
Distinguishes a bot from a worm. Bot is controlled from a facility like an IRC server whereas worm propagates itself. Incomming message acts as commands for bots
36
Keylogger
Captures keystrokes, can filter for keywords such as password
37
Spyware
Monitors comprimised machine
38
Info Theft Phishing
Exploits Social engineering to leverage users trust by pretending to be a trusted source
39
Spearphishing
This is phishing but the target is selected and researched
40
Stealthing backdoor
secret entrypoint in a program allowing attacker to bypass security
41
Maintenance Hook
A backdoor used by programmers
42
Rootkit characteristics
Persistent, Memory based, user mode, kernel mode, virtual machine based, external mode
43
Malware prevention countermeasures
Policy, Awareness, Vulnerability mitigation, Threat Mitigation
44
Malware countermeasures is prevention is failed
Detection, Identification, Removal
45
Generations of Anti Virus
Simple Scanners, Heuristic Scanners, Activity traps, full featured protection
46
Sandbox Analysis
Using malware in a VM to test, anaylse and mitigate