Podcast
Questions and Answers
Which of the following is recommended when downloading files from the Internet?
Which of the following is recommended when downloading files from the Internet?
Regularly maintaining data backup is not important to prevent virus infections.
Regularly maintaining data backup is not important to prevent virus infections.
False
Name two anti-virus tools mentioned in the content.
Name two anti-virus tools mentioned in the content.
AVG Antivirus, Kaspersky Anti-Virus
Ensure the _________ blocker is turned on to enhance online security.
Ensure the _________ blocker is turned on to enhance online security.
Signup and view all the answers
Match the following actions with their purpose:
Match the following actions with their purpose:
Signup and view all the answers
What is the purpose of a wrapper in malware?
What is the purpose of a wrapper in malware?
Signup and view all the answers
A Command Shell Trojan provides remote access to the victim's graphical user interface.
A Command Shell Trojan provides remote access to the victim's graphical user interface.
Signup and view all the answers
What is the installation path of the dropper mentioned?
What is the installation path of the dropper mentioned?
Signup and view all the answers
The Trojan connects to Port _____ to establish a reverse connection.
The Trojan connects to Port _____ to establish a reverse connection.
Signup and view all the answers
Match the following Trojan types with their descriptions:
Match the following Trojan types with their descriptions:
Signup and view all the answers
Which of the following is a method to evade anti-virus detection?
Which of the following is a method to evade anti-virus detection?
Signup and view all the answers
Which type of malware is specifically designed to trick users into providing sensitive information?
Which type of malware is specifically designed to trick users into providing sensitive information?
Signup and view all the answers
Botnet Trojans only affect a single computer at a time.
Botnet Trojans only affect a single computer at a time.
Signup and view all the answers
Malware can only enter a system through infected email attachments.
Malware can only enter a system through infected email attachments.
Signup and view all the answers
What technique do attackers use to embed malware in legitimate advertising networks?
What technique do attackers use to embed malware in legitimate advertising networks?
Signup and view all the answers
Name one potential use of Botnet Trojans.
Name one potential use of Botnet Trojans.
Signup and view all the answers
A program that embeds malware in legitimate software and spreads due to bugs in software is known as a ___.
A program that embeds malware in legitimate software and spreads due to bugs in software is known as a ___.
Signup and view all the answers
Which of the following is NOT a method attackers use to distribute malware?
Which of the following is NOT a method attackers use to distribute malware?
Signup and view all the answers
Match the types of malware with their definitions:
Match the types of malware with their definitions:
Signup and view all the answers
What is the primary function of a Trojan in a cyber attack?
What is the primary function of a Trojan in a cyber attack?
Signup and view all the answers
Attackers commonly exploit ___ in web browsers to initiate Drive-by Downloads.
Attackers commonly exploit ___ in web browsers to initiate Drive-by Downloads.
Signup and view all the answers
What is a key characteristic of a computer virus?
What is a key characteristic of a computer virus?
Signup and view all the answers
Viruses are primarily transmitted through secured channels.
Viruses are primarily transmitted through secured channels.
Signup and view all the answers
What stage of a virus's life cycle involves assimilating defenses against it?
What stage of a virus's life cycle involves assimilating defenses against it?
Signup and view all the answers
A virus that uses encryption to hide its code is referred to as an __________ virus.
A virus that uses encryption to hide its code is referred to as an __________ virus.
Signup and view all the answers
Match the following virus types with their descriptions:
Match the following virus types with their descriptions:
Signup and view all the answers
Which of the following is NOT a reason why people create computer viruses?
Which of the following is NOT a reason why people create computer viruses?
Signup and view all the answers
Trojans downloaded from the web are difficult for antivirus software to detect.
Trojans downloaded from the web are difficult for antivirus software to detect.
Signup and view all the answers
What can happen if a user ignores updates for antivirus applications?
What can happen if a user ignores updates for antivirus applications?
Signup and view all the answers
What is a primary characteristic that differentiates a worm from a virus?
What is a primary characteristic that differentiates a worm from a virus?
Signup and view all the answers
A virus spreads automatically through an infected network.
A virus spreads automatically through an infected network.
Signup and view all the answers
What should you avoid doing to protect against Trojans?
What should you avoid doing to protect against Trojans?
Signup and view all the answers
A worm spreads through the infected _______.
A worm spreads through the infected _______.
Signup and view all the answers
Match the scanning method with its corresponding purpose:
Match the scanning method with its corresponding purpose:
Signup and view all the answers
Which of the following is NOT a method to detect Trojans?
Which of the following is NOT a method to detect Trojans?
Signup and view all the answers
Most commercial anti-virus products can automatically detect backdoor programs.
Most commercial anti-virus products can automatically detect backdoor programs.
Signup and view all the answers
Name one measure to take against viruses and worms.
Name one measure to take against viruses and worms.
Signup and view all the answers
Study Notes
Malware Threats
- Malware is malicious software designed to damage or disable computer systems, and gives the creator limited or full control for theft or fraud.
- Examples of Malware: Trojan Horse, Virus, Backdoor, Worms, Rootkit, Spyware, Ransomware, Botnet, Adware, Crypter
Ways Malware Enters a System
- Instant Messenger applications
- Browser and email software bugs
- IRC (Internet Relay Chat)
- Removable devices
- Attachments
- NetBIOS (FileSharing)
- Fake programs
- Untrusted sites and freeware software
- Downloading files, games, and screensavers from Internet sites
- Legitimate "shrink-wrapped" software (packaged by disgruntled employee)
Techniques Attackers Use to Distribute Malware
- Blackhat Search Engine Optimization (SEO): Ranking malware pages highly in search results
- Social Engineered Click-jacking: Tricking users into clicking on innocent-looking webpages
- Malvertising: Embedding malware in ad-networks displayed on legitimate, high-traffic sites
- Spearphishing Sites: Mimicking legitimate institutions to steal login credentials
- Compromised Legitimate Websites: Hosting embedded malware that spreads to unsuspecting visitors
- Drive-by Downloads: Exploiting flaws in browser software to install malware by simply visiting a website
How Hackers Use Trojans
- Delete or replace operating system's critical files
- Disable firewalls and antivirus
- Generate fake traffic to create DOS attacks
- Record screenshots, audio, and video of victim's PC
- Use victim's PC for spamming and blasting email messages
- Download spyware, adware, and malicious files
- Create backdoors to gain remote access
- Infect victim's PC as a proxy server for relaying attacks
- Use victim's PC as a botnet to perform DDoS attacks
- Steal information such as passwords, security codes, credit card information using keyloggers
How to Infect Systems Using a Trojan
- Create a new Trojan packet using a Trojan Horse Construction Kit
- Create a dropper (part of trojanized packet) that installs malicious code on the target system
- Example of a Dropper: Installation path: c\windows\system32\svchosts.exe; Autostart: HKLM\Software\Mic.....\run\Iexplorer.exe, Malicious code, Client address: client.attacker.com; Dropzone: dropzone.attacker.com
- A genuine application (e.g., chess.exe); Wrapper data: Executable file
- Create a wrapper using wrapper tools to install Trojan on the victim's computer
- Propagate the Trojan
- Execute the dropper
- Execute the damage routine
Wrappers
- Bind a Trojan executable with an innocent-looking .EXE application (e.g., games or office applications)
- When the user runs the wrapped EXE, it installs the Trojan in the background
- Runs the wrapping application in the foreground
- Two programs wrapped into a single file
- Attackers might send a birthday greeting (that secretly installs a Trojan) as the user watches a birthday cake dance across the screen
Command Shell Trojans
- Command shell Trojan grants remote control of a command shell on a victim's machine.
- Trojan server installed on the victim's machine, opens a port for attacker connection
- Client installed on the attacker's machine to launch a command shell on the victim's machine
Remote Access Trojans (RAT)
- Trojan that functions like a remote desktop access
- Hacker gains complete GUI access to the remote system.
- Attacker gains 100% access to the system
- Infect (Rebecca's) computer with server.exe and plant Reverse Connecting Trojan
- Reverse connection to port 80 to attacker
Botnet Trojans
- Infects a large number of computers across a geographical area to create a botnet controlled by a Command and Control (C&C) center
- Botnet is used to launch various attacks, including denial-of-service, spamming, click fraud, and financial information theft.
Evading Anti-Virus Techniques
- Break down Trojan file into multiple pieces and zip them as a single file
- Write your own Trojan and embed it in an application
- Convert .EXE to VB script; change extension to .DOC.EXE, .PPT.EXE, .PDF.EXE (Windows hides these extensions).
- Change Trojan content using a hex editor and change checksum/encrypt file
- Never use Trojans downloaded from the web.
Viruses
- Self-replicating program that produces copies by attaching to programs, computer boot sectors, or documents.
- Commonly transmitted via file downloads, infected disk/flash drives, and email attachments.
- Virus Characteristics:
- Infects other programs
- Alters data
- Transforms itself
- Corrupts files and programs
- Encrypts itself
- Self-replication
Stages of a Virus's Life
- Design: Developing virus code using programming languages or construction kits
- Replication: Virus replicates within the target system
- Launch: Virus gets activated by the user
- Detection: Virus is identified as a threat
- Incorporation: Antivirus software assimilates defenses against the virus
- Elimination: Users install antivirus updates and eliminate virus threats
Why People Create Computer Viruses
- Inflict damage to competitors
- Financial benefits
- Research projects
- Play pranks
- Vandalism
- Cyber terrorism
- Distribute political messages
How a Computer Gets Infected by Viruses
- User accepts files/downloads without checking source
- Opening infected email attachments
- Installing pirated software
- Not updating/installing new versions of plug-ins
- Not running the latest antivirus application
Encryption Viruses
- Virus encrypts code using a different key for each infected file
- Antivirus scanners cannot directly detect encryption viruses using signature detection.
Computer Worms
- Malicious programs that replicate, execute, and spread across networks independently without human interaction
- Primarily replicate and spread across networks, sometimes carrying a payload to damage the host system.
- Attackers use worm payloads to install backdoors that turn infected computers into zombies making up a botnet to carry out further attacks
How a Worm Differs from a Virus
- Worms replicate on their own and use memory; they cannot attach themselves to other programs.
- Worms spread through infected networks by taking advantage of file/information transport features.
Anti-Virus Sensor Systems
- Collection of computer software that detects and analyzes malicious code, such as viruses, worms, and Trojans.
- Used along with sheep dip computers
How to Detect Trojans
- Scan for suspicious open ports
- Scan for suspicious startup programs
- Scan for suspicious running processes
- Scan for suspicious files and folders
- Scan for suspicious registry entries
- Scan for suspicious network activities
- Scan for suspicious device drivers installed on the computer
- Scan for suspicious Windows services
- Run Trojan scanner to detect Trojans
Trojan Countermeasures
- Avoid opening email attachments from unknown senders
- Install patches and security updates
- Block unnecessary ports
- Avoid accepting programs transferred via IM
- Harden weak, default configuration settings
- Monitor internal network traffic for odd ports/encrypted traffic.
- Scan CDs/DVDs with antivirus software
- Restrict permissions/prevent malicious applications installation
- Avoid blindly typing commands/use scripts beforehand
- Manage local workstation file integrity, port scanning
- Avoid downloading/executing applications from untrusted sources
- Use host-based antivirus, firewall, and intrusion detection software
Backdoor Countermeasures
- Ensure that commercial anti-virus products can automatically scan and detect backdoors before they cause damage
- Educate users not to install applications downloaded from untrusted internet sites/Email attachments
- Use anti-virus tools (McAfee, Norton) to detect and eliminate backdoors
Virus and Worm Countermeasures
- Install antivirus software
- Pay attention to instructions when downloading files from the Internet
- Avoid opening attachments from unknown senders
- Schedule regular scans
- Generate anti-virus policy
- Update antivirus software regularly
- Maintain data backup
- Do not accept disks/programs without checking them first
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on cybersecurity measures, malware types, and protection tools. This quiz includes questions about anti-virus tools, Trojans, and safe practices for downloading files from the Internet. Enhance your understanding of online security protocols.