Malware Flashcards
What is a Computer Virus?
Made up of malicious code that’s run on a machine without the user’s knowledge and allows the code to infect the computer whenever it has been run.
Computer viruses can lead to data corruption, loss, or unauthorized access to information.
What is a Boot Sector Virus?
Stored in the first sector of a hard drive and is loaded into memory whenever the computer boots up.
Boot sector viruses can be particularly damaging as they can prevent the operating system from loading.
What is a Macro Virus?
A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed.
Commonly found in documents created with applications like Microsoft Word.
What does a Program Virus do?
Tries to find executables or application files to infect with their malicious code.
These viruses often spread through software downloads or installations.
What is a Multipartite Virus?
A combination of a boot sector type virus and a program virus, able to place itself in the boot sector and install itself in a program.
This type of virus can be particularly difficult to remove due to its dual nature.
What is an Encrypted Virus?
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software.
Encryption makes it harder for security software to recognize the virus.
What is a Polymorphic Virus?
An advanced version of an encrypted virus that changes its code each time it is executed by altering the decryption module to evade detection.
Polymorphic viruses are more challenging to detect and remove than standard viruses.
What is a Metamorphic Virus?
Able to rewrite themselves entirely before attempting to infect a given file.
This capability allows metamorphic viruses to evade detection even more effectively than polymorphic ones.
What is a Stealth Virus?
A technique used to prevent the virus from being detected by antivirus software.
Stealth viruses can manipulate system resources to hide their presence.
What is an Armored Virus?
Has a layer of protection to confuse a program or a person who’s trying to analyze it.
This protection can make it significantly more challenging for security experts to reverse-engineer the virus.
What is a Hoax Virus?
A form of technical social engineering that attempts to scare users into taking undesirable actions on their system.
Hoax viruses often spread through emails or social media, misleading users about threats.
What is a worm in the context of cybersecurity?
A piece of malicious software that can replicate itself without any user interaction
Worms operate autonomously to infect systems.
How do worms replicate and spread?
They self-replicate and spread throughout your network without a user’s consent or action
This ability allows them to propagate rapidly.
What are the two main dangers posed by worms?
- Infecting workstations and other computing assets
- Causing disruptions to normal network traffic
The constant replication attempts can overwhelm network resources.
True or False: Worms require user interaction to spread.
False
Worms can spread without any action from users.
What is a key characteristic of worms compared to viruses?
Worms can replicate themselves without user interaction
Unlike viruses, which often require user action to spread.
Fill in the blank: Worms are best known for spreading far and wide over the internet in a _______.
[short amount of time]
Their rapid propagation can lead to widespread damage.
What is a Trojan?
Piece of malicious software that is disguised as a piece of harmless or desirable software
Trojans are often used to trick users into installing them.
What does RAT stand for?
Remote Access Trojan
RATs provide attackers with remote control of a victim machine.
Why are Trojans commonly used by attackers today?
To exploit a vulnerability in your workstation and conduct data exfiltration, create backdoors, and perform other malicious activities
Attackers use Trojans for various malicious purposes, including stealing sensitive documents.
Fill in the blank: A Remote Access Trojan (RAT) provides the attacker with _______.
remote control of a victim machine
True or False: Trojans can maintain persistence on systems.
True
Trojans can create backdoors to ensure continued access to infected systems.
What is ransomware?
Type of malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker.
How can we protect ourselves and our organizations against ransomware? List at least three methods.
- Always conduct regular backups
- Install software updates regularly
- Provide security awareness training to your users
- Implement Multi-Factor Authentication (MFA)