Malware Flashcards

(46 cards)

1
Q

Any software that is designed to infiltrate a computer system without the user’s knowledge.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A means by which an attacker gains access to a computer to infect the system with malware.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Specific methods used by an attacker to infiltrate a victim’s machine.

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious software code that runs on a machine without the user’s knowledge, attaches to clean files & spreads into a computer system. This allows the code to infect the computer whenever it has been run.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standalone malware programs that replicate & spread to other systems by exploiting software vulnerabilities. It can replicate itself without any user interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious programs which appear to be legitimate software that allow unauthorized access to a victim’s system when executed. It is disguised as a piece of harmless or desirable software.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypts a user’s data &holds it hostage until a ransom is paid to the attacker for decryption. Malicious software that is designed to block access to a computer system or its data by encrypting it until ransom is paid.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compromised computers or devices that are part of a botnet, remotely controlled by attackers, & used in coordination to perform tasks by remote commands.

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network of zombies (compromised computers or devices), controlled remotely by malicious actors, often used for DDos attacks, spam distribution, or cryptocurrency mining.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious tools that hide their activities and operate at the OS level to allow for ongoing privileged access. Software designed to gain administrative-level control over a given computer system without being detected.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malicious means of bypassing normal security and authentication processes to gain unauthorized access to a system.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious embed code placed in legitimate programs that executes a malicious action when a specific condition has been met or a trigger occurs.

A

Logic Bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Piece of software or hardware that records a user’s keystrokes made on a computer or mobile device & is used to capture passwords or other sensitive information.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malicious software that secretly monitors & gathers users and/or organizational information or activities & sends data to third parties.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unnecessary or pre-installed software on a new computer or smartphone that consumes system resources & space without offering any value to the user.

A

Bloatware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Involve methods by which malware infiltrates & infects targeted systems. Describes the specific methods by which malware code infects a target host.

A

Malware Exploitation Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stored in the first sector of a hard drive & is then loaded into memory whenever the computer boots up.

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed.

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tries to find executable or application files to infect with their malicious code.

A

Program Virus

20
Q

A combination of a boot Sector type virus and a program virus.

A

Multipartite Virus

21
Q

Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software.

A

Encrypted Virus

22
Q

Advanced version of an encrypted Virus, but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order for it to evade detection.

A

Polymorphic Virus

23
Q

Able to rewrite itself entirely before it attempts to infect a given file.

A

Metamorphic Virus

24
Q

Not necessarily a specific type of virus as much as it is a technique used to prevent the virus from being detected by the anti-virus software.

A

Stealth Virus

25
Have a layer of protection to confuse a program or a person who's trying to analyze it.
Armored Virus
26
A form of technical social engineering that attempts to scare end users into taking undesirable action on their system.
Hoax
27
Type of Trojan that is widely used by modern attackers because it provides the attacker, (threat actor), with persistent access, (remote control) of a victim's machine.
Remote Access Trojan (RAT)
28
Backup all of important data, files, and systems.
Conducting Regular Backups
29
Update all of the software, especially operating system & antivirus programs.
Installing Regular Software Updates
30
Provided to end users to improve security.
Providing Security Awareness Training
31
Provides an extra layer of security for authentication.
Implementing Multi-factor Authentication
32
Steps to take when affected by Ransomware.
1. Never Pay 2. Disconnect from network 3. Notify the authorities 4. Restore systems and data from known good backups
33
Responsible for managing & coordinating activities of other nodes or devices within a network.
Command & Control Node
34
Allows a system to control access to things like device drivers, sound card, & monitor.
Kernel Mode (Ring Zero)
35
Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic-link library.
DLL Injection
36
Software code that is placed between two components.
Shim
37
Insecure coding practice that was used by programmers to provide a joke or a gag gift to the users.
Easter Egg
38
Used to create a process in the system memory without relying on the local file system of the infected host.
Fileless Malware
39
When a user clicks on a malicious link or opens a malicious files, malware is installed.
Stage 1: Dropper or Downloader
40
Initiates or runs other malware forms within a payload on an infected host.
Dropper
41
Retrieves additional tools post the initial infection facilitated by a dropper.
Downloader
42
Encompasses lightweight code meant to execute an exploit on a given target.
Shellcode
43
Download & install a remote access Trojan to conduct command & control on the victimized system.
Stage 2: Downloader
44
Threat actors will execute primary objectives to meet core objectives (data Exfiltration or file encryption).
Actions on Objective Phase
45
Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasing log files, and hiding any evidence of malicious activities.
Concealment
46
A strategy adopted by many Advanced Persistent Threats & Criminal organizations. Threat actors try to exploit the standard system tools to perform intrusions.
Living Off the Land