Malware Flashcards
(46 cards)
Any software that is designed to infiltrate a computer system without the user’s knowledge.
Malware
A means by which an attacker gains access to a computer to infect the system with malware.
Attack Vector
Specific methods used by an attacker to infiltrate a victim’s machine.
Threat Vector
Malicious software code that runs on a machine without the user’s knowledge, attaches to clean files & spreads into a computer system. This allows the code to infect the computer whenever it has been run.
Viruses
Standalone malware programs that replicate & spread to other systems by exploiting software vulnerabilities. It can replicate itself without any user interaction.
Worm
Malicious programs which appear to be legitimate software that allow unauthorized access to a victim’s system when executed. It is disguised as a piece of harmless or desirable software.
Trojans
Encrypts a user’s data &holds it hostage until a ransom is paid to the attacker for decryption. Malicious software that is designed to block access to a computer system or its data by encrypting it until ransom is paid.
Ransomware
Compromised computers or devices that are part of a botnet, remotely controlled by attackers, & used in coordination to perform tasks by remote commands.
Zombies
Network of zombies (compromised computers or devices), controlled remotely by malicious actors, often used for DDos attacks, spam distribution, or cryptocurrency mining.
Botnet
Malicious tools that hide their activities and operate at the OS level to allow for ongoing privileged access. Software designed to gain administrative-level control over a given computer system without being detected.
Rootkits
Malicious means of bypassing normal security and authentication processes to gain unauthorized access to a system.
Backdoors
Malicious embed code placed in legitimate programs that executes a malicious action when a specific condition has been met or a trigger occurs.
Logic Bombs
Piece of software or hardware that records a user’s keystrokes made on a computer or mobile device & is used to capture passwords or other sensitive information.
Keyloggers
Malicious software that secretly monitors & gathers users and/or organizational information or activities & sends data to third parties.
Spyware
Unnecessary or pre-installed software on a new computer or smartphone that consumes system resources & space without offering any value to the user.
Bloatware
Involve methods by which malware infiltrates & infects targeted systems. Describes the specific methods by which malware code infects a target host.
Malware Exploitation Techniques
Stored in the first sector of a hard drive & is then loaded into memory whenever the computer boots up.
Boot Sector Virus
A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed.
Macro Virus
Tries to find executable or application files to infect with their malicious code.
Program Virus
A combination of a boot Sector type virus and a program virus.
Multipartite Virus
Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software.
Encrypted Virus
Advanced version of an encrypted Virus, but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order for it to evade detection.
Polymorphic Virus
Able to rewrite itself entirely before it attempts to infect a given file.
Metamorphic Virus
Not necessarily a specific type of virus as much as it is a technique used to prevent the virus from being detected by the anti-virus software.
Stealth Virus