Troubleshoot Workstation Security Issues Flashcards
lesson 17C (63 cards)
Actual Keylogger—Windows software that can run in the background to monitor different kinds of
computer activity
WannaCry ransomware.
Untrusted certificate warning in Mozilla Firefox.
Threats discovered by Windows Defender Antivirus
Microsoft’s Security Intelligence knowledge base can be used to obtain additional information about threats discovered by Windows Defender Antivirus.
Microsoft’s Windows Defender Antivirus uses a system of continual threat/definition updates.
Malware vectors
refer to the methods by which malware executes and spreads. Common types include viruses, which infect executable files; boot sector viruses, which hijack a disk’s boot process; and Trojans, which masquerade as legitimate software and often establish persistence by running at startup.
Malware
is malicious software designed to harm systems, with classifications based on how it spreads and executes, aiding in identifying sources and impacts of security incidents.
vector
is the method by which the malware executes on a computer and potentially spreads to other network hosts.
Viruses
embed themselves in executable files (.EXE, .MSI, .DLL, etc.) and activate when the file runs, often gaining the same privileges as the infected process. Early viruses spread rapidly, while modern ones use stealth techniques to maintain control over a system.
Malware payload
classification focuses on the actions malware performs beyond replication or persistence, helping to identify its specific impact on a system.
Backdoors,
often implemented as remote access Trojans (RATs), grant attackers unauthorized access to a system, enabling data exfiltration, malware installation, or botnet integration for launching attacks. Threat actors establish covert command and control (C2) connections, often embedding commands within HTTPS or DNS traffic to evade detection.
Spyware
alters browser settings, monitors activity, and can redirect DNS queries to spoofed sites, compromising security and user privacy.
keylogger
is a form of spyware that records keystrokes, allowing attackers to capture sensitive information like passwords and credit card details.
Keyloggers software/hardware
can be implemented as software that transmits keystrokes to an external server or as hardware devices that intercept inputs via modified USB adapters.
Rootkits
are advanced malware that gain SYSTEM-level privileges, often exploiting vulnerabilities or escalating privileges post-installation. They can conceal their presence by modifying system processes, bypassing detection in tools like Task Manager, ps
, or netstat
, and even wiping system logs to further evade security measures.
Ransomware
extorts victims by either blocking access to their systems or encrypting files, demanding payment to restore access. Crypto-ransomware, like Cryptolocker, encrypts data, making recovery nearly impossible without backups. Attackers use anonymous payment methods like cryptocurrency to evade law enforcement.
Cryptomining, or cryptojacking
hijacks a system’s resources to mine cryptocurrency, leveraging immense computing power to generate digital coins. Attackers often deploy cryptominers across botnets to maximize mining efficiency while remaining undetected.
malware signs
Unexpected system behavior or unauthorized configuration changes are common signs of malware infection. Identifying symptoms based on malware vectors and payloads helps determine the appropriate troubleshooting and remediation steps.
malware infection issues
Performance issues like system slowdowns, boot failures, and network disruptions may indicate malware infection, requiring antivirus scans and potential quarantine for further investigation.
Frequent crashes
of security-related applications like antivirus, firewalls, and Windows Update can indicate malware infection. Malware often targets vulnerable third-party software, especially browser plug-ins. If reputable software begins failing repeatedly, malware should be suspected, and quarantining or monitoring procedures applied.
file system errors
File system anomalies, such as missing or renamed files, unauthorized executables mimicking system processes, altered file attributes, and unexpected access errors, often indicate malware infection. These issues warrant immediate investigation and system quarantine to prevent further compromise.
Fake security alerts
Malware can exploit push notifications to mimic Windows alerts, tricking users into installing harmful software. Fake security alerts may lead to drive-by downloads or rogue antivirus scams, where attackers impersonate support representatives to gain remote access. Vigilance against unsolicited alerts and cold calls is essential to prevent infection.
Malware targeting browsers
can lead to unexpected pop-ups, altered settings, and performance issues, often signaling infection by spyware or adware.