Questions from readings Flashcards

1
Q

What is the difference between persistent and transient malware?

A

Persistent malware is stored somewhere like a file system, so rebooting the computer will not get rid of it. Transient malware is memory dependent and will disappear after rebooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is standalone malware?

A

A complete program that can run on its own, rather than a sequence of instructions that require a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the opposite of auto-spreading malware?

A

Malware activated by user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between static and dynamic malware?

A

Dynamic malware can be continuously updated by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Polymorphism can be used to bypass what kind of detection technique?

A

Signature based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition of botnet malware?

A

Any malware part of a botnet infrastructure that provides command-and-control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a PUP?

A

A Potentially Unwanted Program is a piece of code downloaded by the user as part of a useful program, such as a user downloads a game that comes with adware that collects user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the characteristics of APT?

A

The are persistent, receive updates from the attacker and are quiet. All of these factors are necessary for the APT to have a long lifespan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does static analysis of malware involve?

A

Examining the code of the malware without actually executing it - this is of limited use since behaviour will change during runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does dynamic analysis of malware involve?

A

Examining the behaviour of malware during runtime - might miss behaviour not triggered by input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is fuzzing?

A

Method for discovering vulnerabilities by feeding randomised inputs to programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Given the safety and live-environment requirements of malware analysis, analysis environments are usually constructed using what?

A

Virtualisation technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most common code obfuscation technique?

A

Packing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are heuristics?

A

Heuristic analysis helps identify threats that might evade traditional signature-based detection. It analyses patterns and behaviours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most reliable way to detect packed malware?

A

Wait for it to unpack and execute and observe behaviour at runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of a technique used to take down C&C domains?

A

Sinkholing

17
Q

What does a DNS fast-flux network do?

A

It points the C&C domain names to a large pool of compromised machines, used in combination with DGAs (Domain-name Generated Algorithms)

18
Q

What are cyber-dependent crimes?

A

Crimes that can only be committed with the use of computer/technology devices

19
Q

What is an example of interpersonal cybercrime?

A

Doxing

20
Q

What is one of the most common types of cybercrimes perpetrated by organised criminals?

A

Advance fee fraud: scams involving Nigerian princes with inheritances but also romance scams

21
Q

What is financial malware?

A

Installing malware on victims’ computers and steal financial credentials

22
Q

What is cryptojacking?

A

Adding scripts to webpages and have visitors mine cryptocurrencies

23
Q

What are the two key differences between attacks by financially motivated groups and state actors?

A

-Commodity cybercrime needs as many victims as possible and therefore needs to be as general as possible, whereas state-sponsored attacks usually have well-defined victims
-Commodity cybercrime needs to be fast, state-sponsored attacks do not

24
Q

State-sponsored attacks fall into which three categories?

A

-Sabotage
-Espionage
-Disinformation

25
Q

Four examples of infection vectors?

A

-Malicious attachments
-Black hat search engine optimisation
-Drive by download attacks
-Compromising of internet connected devices