Malware Flashcards
(34 cards)
What is malware?
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
Malware can take various forms and is categorized into types such as viruses, worms, and ransomware.
Name three categories of malware.
- Viruses
- Worms
- Ransomware
What is a threat vector?
Method used to infiltrate a victim’s machine
Examples include unpatched software and phishing campaigns.
What is an attack vector?
Means by which the attacker gains access and infects the system
It combines both the infiltration method and the infection process.
What are the characteristics of viruses?
Attach to clean files, spread, and corrupt host files
Describe worms.
Standalone programs replicating and spreading to other computers
What defines a Trojan?
Disguises as legitimate software, granting unauthorized access
What is ransomware?
Encrypts user data, demands ransom for decryption
What are zombies and botnets?
Compromised computers remotely controlled in a network for malicious purposes
Define rootkits.
Hide presence and activities on a computer, operate at the OS level
What are backdoors?
Allow unauthorized access to a system
What is a logic bomb?
Malicious code that executes when certain conditions are met
What is a keylogger?
Records keystrokes, captures passwords or sensitive information
How does spyware function?
Monitors and gathers user/system information
What is bloatware?
Software that comes pre-installed on devices that users did not specifically request
Fill in the blank: A _______ is a piece of malicious software that can replicate itself without user interaction.
worm
True or False: Ransomware guarantees data recovery if the ransom is paid.
False
What is a botnet?
Network of compromised computers or devices controlled remotely by malicious actors
What is a command and control node?
Computer responsible for managing and coordinating activities of other nodes within a network
What is the purpose of a rootkit?
Gain administrative level control over a computer system without being detected
What is DLL injection?
Technique used to run arbitrary code within the address space of another process
What is a stage one dropper?
Piece of malware created as a lightweight shellcode that can be executed on a system
What does ‘living off the land’ mean in cybersecurity?
Exploiting standard tools to perform intrusions
What are common indicators of malware attacks? Name two.
- Account lockouts
- Concurrent session utilization