Podcast
Questions and Answers
Which of the following best describes a 'threat' in the context of information security?
Which of the following best describes a 'threat' in the context of information security?
- An individual or group attempting to exploit vulnerabilities.
- A security measure implemented to protect against potential harm.
- A weakness in a system that can be exploited.
- The potential occurence of an undesirable event that can damage or disrupt an organization's activities. (correct)
Which action is an example of an attacker performing privilege escalation?
Which action is an example of an attacker performing privilege escalation?
- Exploiting a vulnerability to gain unauthorized administrative rights. (correct)
- Tricking an employee into divulging sensitive company information.
- Causing a server to shut down unexpectedly.
- Remotely altering data within a database server.
Which of the following threat sources is primarily associated with natural disasters?
Which of the following threat sources is primarily associated with natural disasters?
- Unintentional threats.
- External threats.
- Intentional threats.
- Natural threats. (correct)
Which of the following describes an 'unstructured external threat'?
Which of the following describes an 'unstructured external threat'?
What is the primary difference between a 'White Hat' and a 'Black Hat' hacker?
What is the primary difference between a 'White Hat' and a 'Black Hat' hacker?
What motivates 'Cyber Terrorists' as threat actors?
What motivates 'Cyber Terrorists' as threat actors?
What is the main goal of 'Industrial Spies' as threat actors?
What is the main goal of 'Industrial Spies' as threat actors?
Which attribute best describes an 'Insider' threat actor?
Which attribute best describes an 'Insider' threat actor?
Which of the following is considered a 'threat vector'?
Which of the following is considered a 'threat vector'?
Which of the following scenarios is an example of using 'removable media' as a threat vector?
Which of the following scenarios is an example of using 'removable media' as a threat vector?
Which of the following describes how 'Supply chain' can be a threat vector?
Which of the following describes how 'Supply chain' can be a threat vector?
What is the primary purpose of malware?
What is the primary purpose of malware?
Which of the following is a common way for malware to enter a system?
Which of the following is a common way for malware to enter a system?
What is the purpose of a 'crypter' in the context of malware?
What is the purpose of a 'crypter' in the context of malware?
Which component of malware defines the basic functionality that results in security breaches?
Which component of malware defines the basic functionality that results in security breaches?
What is the primary function of a Trojan?
What is the primary function of a Trojan?
Which of the following is an indication of a Trojan attack?
Which of the following is an indication of a Trojan attack?
How do attackers use Trojans to steal information?
How do attackers use Trojans to steal information?
What is a key characteristic of a virus?
What is a key characteristic of a virus?
Which of the following is a common way a computer gets infected by viruses?
Which of the following is a common way a computer gets infected by viruses?
Which type of virus infects Microsoft Word or similar applications by automatically performing a sequence of actions?
Which type of virus infects Microsoft Word or similar applications by automatically performing a sequence of actions?
What action does a 'Sparse Infector Virus' typically take?
What action does a 'Sparse Infector Virus' typically take?
What is a key step in creating a simple virus program as mentioned?
What is a key step in creating a simple virus program as mentioned?
Which action cannot typically be performed once a virus file is built and executed using virus maker tools?
Which action cannot typically be performed once a virus file is built and executed using virus maker tools?
What is the primary action that 'Ransomware' performs?
What is the primary action that 'Ransomware' performs?
What is a key difference between a Worm and a Virus?
What is a key difference between a Worm and a Virus?
What is the main goal of attackers who use Botnets?
What is the main goal of attackers who use Botnets?
What defines 'Fileless Malware'?
What defines 'Fileless Malware'?
Which of the followings is the benefit attackers get from using 'Fileless Malware'?
Which of the followings is the benefit attackers get from using 'Fileless Malware'?
Which of the following is a propagation technique associated with fileless malware?
Which of the following is a propagation technique associated with fileless malware?
What is a key characteristic of a 'vulnerability'?
What is a key characteristic of a 'vulnerability'?
Which of the following can 'hardware/software misconfigurations' lead to?
Which of the following can 'hardware/software misconfigurations' lead to?
Why is 'end-user carelessness' a concerning factor for network security?
Why is 'end-user carelessness' a concerning factor for network security?
Why does lacking the latest updates make operating systems vulnerable?
Why does lacking the latest updates make operating systems vulnerable?
Which of the following is a likely impact caused due to vulnerabilities?
Which of the following is a likely impact caused due to vulnerabilities?
What does the 'Risk' refers to?
What does the 'Risk' refers to?
What are 'zero-day vulnerabilities'?
What are 'zero-day vulnerabilities'?
What term describes a situation where an increased number of server connections exist due to an increasing number of systems, due to lacking documentation?
What term describes a situation where an increased number of server connections exist due to an increasing number of systems, due to lacking documentation?
Which scenario exemplifies an organization experiencing a 'threat' to its information security?
Which scenario exemplifies an organization experiencing a 'threat' to its information security?
Which scenario is an example of an intentional, external threat?
Which scenario is an example of an intentional, external threat?
An untrained staff member clicks on a phishing email and inadvertently installs malware. Which type of threat source does this represent?
An untrained staff member clicks on a phishing email and inadvertently installs malware. Which type of threat source does this represent?
A group of highly skilled hackers is hired by a competitor to steal trade secrets from a company. What type of threat actor are these hackers?
A group of highly skilled hackers is hired by a competitor to steal trade secrets from a company. What type of threat actor are these hackers?
Which of the following best describes a 'Gray Hat' hacker?
Which of the following best describes a 'Gray Hat' hacker?
Which of the following threat actors is MOST likely to use defacement to promote their agenda?
Which of the following threat actors is MOST likely to use defacement to promote their agenda?
An employee uses their access to sensitive company data to sell it to a competitor for personal gain. Which type of threat actor does this represent?
An employee uses their access to sensitive company data to sell it to a competitor for personal gain. Which type of threat actor does this represent?
Which of the following is a characteristic unique to 'Hacker Teams' compared with other threat actors?
Which of the following is a characteristic unique to 'Hacker Teams' compared with other threat actors?
Which attack vector involves an attacker gaining physical access to a system to install malicious software?
Which attack vector involves an attacker gaining physical access to a system to install malicious software?
An attacker exploits a vulnerability in a third-party vendor's software to compromise a target organization. Which threat vector does this represent?
An attacker exploits a vulnerability in a third-party vendor's software to compromise a target organization. Which threat vector does this represent?
What is the PRIMARY risk associated with business partners as a threat vector?
What is the PRIMARY risk associated with business partners as a threat vector?
An attacker injects malicious code into a virtual machine instance in a cloud environment to intercept user requests. Which threat vector is being used?
An attacker injects malicious code into a virtual machine instance in a cloud environment to intercept user requests. Which threat vector is being used?
Which of the following actions performed by malware aims to slow down systems and degrade system performance?
Which of the following actions performed by malware aims to slow down systems and degrade system performance?
Which practice can best mitigate the entry of malware through portable hardware?
Which practice can best mitigate the entry of malware through portable hardware?
What is the MOST likely action an attacker will take after successfully employing a 'Black Hat SEO' technique?
What is the MOST likely action an attacker will take after successfully employing a 'Black Hat SEO' technique?
What is the purpose of a 'Downloader' in the context of malware?
What is the purpose of a 'Downloader' in the context of malware?
An attacker embeds malware within a seemingly harmless file, which then covertly installs other malicious components on the system. What type of malware component is being used?
An attacker embeds malware within a seemingly harmless file, which then covertly installs other malicious components on the system. What type of malware component is being used?
Which malware component is responsible for taking advantage of a system vulnerability to breach its security?
Which malware component is responsible for taking advantage of a system vulnerability to breach its security?
A program injects malicious code into other running processes to hide or prevent its removal. What component of malware is this program acting as?
A program injects malicious code into other running processes to hide or prevent its removal. What component of malware is this program acting as?
Which type of Trojan provides attackers with full control over the victim's system, enabling them to remotely access files and data?
Which type of Trojan provides attackers with full control over the victim's system, enabling them to remotely access files and data?
A type of Trojan specifically targets financial information by intercepting account details before they are encrypted. Which type of Trojan is this?
A type of Trojan specifically targets financial information by intercepting account details before they are encrypted. Which type of Trojan is this?
Which action is MOST indicative of a system infected with a Rootkit Trojan?
Which action is MOST indicative of a system infected with a Rootkit Trojan?
How do threat actors commonly distribute 'E-Banking Trojans'?
How do threat actors commonly distribute 'E-Banking Trojans'?
A virus spreads by modifying the hard disk data and running COM files before EXE files launch. Which type of virus is this?
A virus spreads by modifying the hard disk data and running COM files before EXE files launch. Which type of virus is this?
A virus is designed to avoid detection by modifying its code with each replication but contains a constant decryption module. What type of virus is this?
A virus is designed to avoid detection by modifying its code with each replication but contains a constant decryption module. What type of virus is this?
Which of the following is a key difference between a direct-action virus and a terminate-and-stay-resident (TSR) virus?
Which of the following is a key difference between a direct-action virus and a terminate-and-stay-resident (TSR) virus?
Which of the following actions indicates a computer is likely infected with a virus?
Which of the following actions indicates a computer is likely infected with a virus?
What is a key feature in the 'Replication' stage of a virus lifecycle?
What is a key feature in the 'Replication' stage of a virus lifecycle?
An employee downloads a pirated software program and installs it on their work computer, leading to a virus infection. Which factor contributed to this?
An employee downloads a pirated software program and installs it on their work computer, leading to a virus infection. Which factor contributed to this?
After creating a simple .bat
virus, what next step is crucial to be applied to this file for it do its intention?
After creating a simple .bat
virus, what next step is crucial to be applied to this file for it do its intention?
What immediate action will occur upon executing a created virus file, once built, using virus maker tools?
What immediate action will occur upon executing a created virus file, once built, using virus maker tools?
A type of malware restricts access to a computer system's files and demands payment. What type of malware is this?
A type of malware restricts access to a computer system's files and demands payment. What type of malware is this?
Ransomware is delivered to the victims through an email campaign with the ransom notes asking for payment in?
Ransomware is delivered to the victims through an email campaign with the ransom notes asking for payment in?
Which action best differentiates a worm from a virus?
Which action best differentiates a worm from a virus?
When a computer is connected to internet the Worms use what techniques to spread?
When a computer is connected to internet the Worms use what techniques to spread?
What is the primary reason attackers use botnets?
What is the primary reason attackers use botnets?
Which characteristic defines 'fileless malware'?
Which characteristic defines 'fileless malware'?
What is the key characteristic of fileless malware relating to the programs it infects?
What is the key characteristic of fileless malware relating to the programs it infects?
An attacker performs the following activities inject malicious code that performs keylogging to a .docx document. Which fileless propagation technique does this fall under?
An attacker performs the following activities inject malicious code that performs keylogging to a .docx document. Which fileless propagation technique does this fall under?
What is indicated by a software application being identified as a PUA (Potentially Unwanted Application)?
What is indicated by a software application being identified as a PUA (Potentially Unwanted Application)?
What is the MOST obvious indication of an adware infection?
What is the MOST obvious indication of an adware infection?
What kind of information is typically recorded by a keylogger?
What kind of information is typically recorded by a keylogger?
Which activity that a keylogger can do will record the online URL's that have been visited by the user.
Which activity that a keylogger can do will record the online URL's that have been visited by the user.
Which action would a 'Bot' typically perform in a botnet?
Which action would a 'Bot' typically perform in a botnet?
Which statement accurately describes the function of Rootkits used by attackers?
Which statement accurately describes the function of Rootkits used by attackers?
What is a common method used by attackers to place a Rootkit on a system?
What is a common method used by attackers to place a Rootkit on a system?
An organization's security team discovers several instances of unauthorized access to sensitive servers. Upon investigation, they find that many servers are running with default configurations. Which type of vulnerability is this an example of?
An organization's security team discovers several instances of unauthorized access to sensitive servers. Upon investigation, they find that many servers are running with default configurations. Which type of vulnerability is this an example of?
A web server is misconfigured, allowing unauthorized users to list directory contents and gain access to sensitive files. Which area of vulnerability does this represent?
A web server is misconfigured, allowing unauthorized users to list directory contents and gain access to sensitive files. Which area of vulnerability does this represent?
What best describes how 'Design Flaws' can make system prone to risk?
What best describes how 'Design Flaws' can make system prone to risk?
Given the potential for both intentional and unintentional harm to an organization, which of the following roles could pose the greatest threat if they misuse their network privileges?
Given the potential for both intentional and unintentional harm to an organization, which of the following roles could pose the greatest threat if they misuse their network privileges?
In a scenario where a disgruntled employee is planning to leak sensitive company data to a competitor, which type of threat does this represent?
In a scenario where a disgruntled employee is planning to leak sensitive company data to a competitor, which type of threat does this represent?
A security firm identifies a group of hackers using sophisticated tools and techniques to disrupt a nation's critical infrastructure. Which category of threat actor do they likely belong to?
A security firm identifies a group of hackers using sophisticated tools and techniques to disrupt a nation's critical infrastructure. Which category of threat actor do they likely belong to?
An attacker gains unauthorized access to a company's network by exploiting a zero-day vulnerability in a widely used software. How would you categorize this threat?
An attacker gains unauthorized access to a company's network by exploiting a zero-day vulnerability in a widely used software. How would you categorize this threat?
An organization discovers that a partner company's compromised system was used to inject malware into their network through a shared data exchange process. What threat vector would you classify this as?
An organization discovers that a partner company's compromised system was used to inject malware into their network through a shared data exchange process. What threat vector would you classify this as?
A company's web server is compromised after an attacker exploits a vulnerability in a third-party library used by the website. Which threat vector does this represent?
A company's web server is compromised after an attacker exploits a vulnerability in a third-party library used by the website. Which threat vector does this represent?
After successfully gaining access to a system, malware begins to disable security software and create backdoors for persistent access. What components are likely being used?
After successfully gaining access to a system, malware begins to disable security software and create backdoors for persistent access. What components are likely being used?
Which of the following combinations of malware components would be MOST effective for an attacker aiming to exfiltrate sensitive data while remaining undetected?
Which of the following combinations of malware components would be MOST effective for an attacker aiming to exfiltrate sensitive data while remaining undetected?
A user reports that their computer screen is flickering and web pages are opening without any user interaction. Antivirus is disabled, and the mouse cursor moves erratically. What type of malware infection is indicated?
A user reports that their computer screen is flickering and web pages are opening without any user interaction. Antivirus is disabled, and the mouse cursor moves erratically. What type of malware infection is indicated?
A user installs a program and then observes that their screensaver has been replaced with a scrolling advertisement. Which of the Trojan actions is most likely occurring?
A user installs a program and then observes that their screensaver has been replaced with a scrolling advertisement. Which of the Trojan actions is most likely occurring?
After creating a simple virus using a batch file, what must an attacker do to initiate the virus's replication and harmful actions on a target system?
After creating a simple virus using a batch file, what must an attacker do to initiate the virus's replication and harmful actions on a target system?
A user reports that all their files have been encrypted, and they are asked to send Bitcoin within 48 hours. What type of malware is most likely affecting this system?
A user reports that all their files have been encrypted, and they are asked to send Bitcoin within 48 hours. What type of malware is most likely affecting this system?
Which action taken by a worm is MOST indicative of its propagation method, differentiating it from a virus?
Which action taken by a worm is MOST indicative of its propagation method, differentiating it from a virus?
An organization detects a sudden surge in network traffic originating from numerous internal systems, all communicating with a single external command server. Which malware type is likely responsible?
An organization detects a sudden surge in network traffic originating from numerous internal systems, all communicating with a single external command server. Which malware type is likely responsible?
An attacker successfully injects malicious code into a running instance of PowerShell to download and execute arbitrary commands without writing any files to disk. Which is being used?
An attacker successfully injects malicious code into a running instance of PowerShell to download and execute arbitrary commands without writing any files to disk. Which is being used?
What is the most common method used among the methods listed below to trick users in installing a Potentially Unwanted Application (PUA)?
What is the most common method used among the methods listed below to trick users in installing a Potentially Unwanted Application (PUA)?
An employee reports that a program installed on their computer is constantly displaying intrusive pop-up ads, even when the browser is closed. What specific type of PUA is most likely causing this?
An employee reports that a program installed on their computer is constantly displaying intrusive pop-up ads, even when the browser is closed. What specific type of PUA is most likely causing this?
Which setting in a web browser, when enabled, would a keylogger be MOST likely to record and transmit to an attacker?
Which setting in a web browser, when enabled, would a keylogger be MOST likely to record and transmit to an attacker?
An internal phishing campaign reveals that several employees are not changing default passwords on newly provisioned devices. What type of this misconfiguration directly increases the systems vulnerability?
An internal phishing campaign reveals that several employees are not changing default passwords on newly provisioned devices. What type of this misconfiguration directly increases the systems vulnerability?
An organization discovers that a critical database server was left running with default settings by a junior technician as a result of inexperience. Given the impact of this setting on the overall risk posture of the organization, how must this misconfiguration be categorized?
An organization discovers that a critical database server was left running with default settings by a junior technician as a result of inexperience. Given the impact of this setting on the overall risk posture of the organization, how must this misconfiguration be categorized?
Flashcards
What is a Threat?
What is a Threat?
The potential for an undesirable event to damage and disrupt an organization.
Examples of Threats
Examples of Threats
Stealing data, causing shutdowns, tricking employees, or infecting systems
Threat Sources
Threat Sources
Natural events, unintentional errors, or intentional attacks.
Natural Threats
Natural Threats
Signup and view all the flashcards
Unintentional Threats
Unintentional Threats
Signup and view all the flashcards
Intentional Threats
Intentional Threats
Signup and view all the flashcards
Internal Threats
Internal Threats
Signup and view all the flashcards
External Threats
External Threats
Signup and view all the flashcards
Structured External Threats
Structured External Threats
Signup and view all the flashcards
Unstructured External Threats
Unstructured External Threats
Signup and view all the flashcards
Black Hats
Black Hats
Signup and view all the flashcards
White Hats
White Hats
Signup and view all the flashcards
Gray Hats
Gray Hats
Signup and view all the flashcards
Suicide Hackers
Suicide Hackers
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Cyber Terrorists
Cyber Terrorists
Signup and view all the flashcards
State-Sponsored Hackers
State-Sponsored Hackers
Signup and view all the flashcards
Hacktivist
Hacktivist
Signup and view all the flashcards
Hacker Teams
Hacker Teams
Signup and view all the flashcards
Industrial Spies
Industrial Spies
Signup and view all the flashcards
Insiders
Insiders
Signup and view all the flashcards
Criminal Syndicates
Criminal Syndicates
Signup and view all the flashcards
Organized Hackers
Organized Hackers
Signup and view all the flashcards
Threat Vector
Threat Vector
Signup and view all the flashcards
Direct Access
Direct Access
Signup and view all the flashcards
Removable Media
Removable Media
Signup and view all the flashcards
Wireless
Wireless
Signup and view all the flashcards
Email
Signup and view all the flashcards
Cloud
Cloud
Signup and view all the flashcards
Ransomware/Malware
Ransomware/Malware
Signup and view all the flashcards
Supply Chain
Supply Chain
Signup and view all the flashcards
Business Partners
Business Partners
Signup and view all the flashcards
Introduction to Malware
Introduction to Malware
Signup and view all the flashcards
Ways for Malware to Enter
Ways for Malware to Enter
Signup and view all the flashcards
Crypter
Crypter
Signup and view all the flashcards
Downloader
Downloader
Signup and view all the flashcards
Dropper
Dropper
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Injector
Injector
Signup and view all the flashcards
Obfuscator
Obfuscator
Signup and view all the flashcards
Packer
Packer
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Malicious Code
Malicious Code
Signup and view all the flashcards
What is a Trojan?
What is a Trojan?
Signup and view all the flashcards
Black Hat SEO (SEO)
Black Hat SEO (SEO)
Signup and view all the flashcards
Social Engineered Click-jacking
Social Engineered Click-jacking
Signup and view all the flashcards
Spear-phishing Sites
Spear-phishing Sites
Signup and view all the flashcards
Malvertising
Malvertising
Signup and view all the flashcards
Drive-by Downloads
Drive-by Downloads
Signup and view all the flashcards
Compromised Legitimate Websites
Compromised Legitimate Websites
Signup and view all the flashcards
Spam Emails
Spam Emails
Signup and view all the flashcards
Study Notes
What is a Threat?
- A threat is a potential event that is undesirable and could damage or disrupt an organization's operations.
- Attackers use cyber threats to infiltrate systems and steal data, including personal, financial, and login credentials.
Examples of Threats
- Attackers may steal sensitive data.
- Attackers may cause servers to shut down.
- Attackers may trick employees into revealing sensitive information.
- Attackers may infect systems with malware.
- Attackers may spoof the identity of authorized personnel.
- Attackers may modify or tamper with network data.
- Attackers may remotely alter database servers.
- Attackers may perform URL redirection or forwarding.
- Attackers may perform privilege escalation for unauthorized access.
- Attackers may execute denial-of-service (DoS) attacks.
- Attackers may eavesdrop on communication channels without authorization.
Threat Sources
- Threat sources can be natural, unintentional, or intentional.
- Natural threats include fires, floods, and power failures, which can cause physical damage.
- Unintentional threats arise from insider errors, including security breaches, negligence, unskilled administrators, and accidents.
- Intentional threats can be internal, performed by insiders like disgruntled employees, or external, performed by outside attackers.
- Structured external threats are implemented by technically skilled attackers using various tools.
- Criminal bribes, racism, politics, and terrorism are motivators for structured external threats.
- Unstructured external threats are implemented by unskilled attackers, often out of curiosity rather than criminal intent, and use freely available tools.
- Security solutions like port-scanning and address-sweeping tools can prevent unstructured external threats.
Threat Actors and Agents
- Black hats use extraordinary computing skills for illegal activities and are known as crackers.
- White hats or penetration testers use hacking skills for defensive purposes with permission from the system owner.
- Gray hats work both offensively and defensively, sometimes helping vendors improve products.
- Suicide hackers aim to disrupt critical infrastructure for a cause and are not concerned with punishment.
- Script kiddies are unskilled hackers using tools developed by others to gain popularity or prove technical skills.
- Cyber terrorists are motivated by religious or political beliefs to disrupt computer networks.
- State-sponsored hackers are employed by governments to penetrate and damage information systems of other governments, and gather intelligence.
- Industrial spies perform corporate espionage to steal critical information from competitor organizations.
- Insiders are employees who misuse privileged access for malicious purposes.
- Hacker teams are skilled hackers working together with their own funding.
- Criminal syndicates are involved in organized cyber-attacks and money laundering.
- Hacktivists use hacking to promote social or political agendas, and deface or disable websites.
- Organized hackers use rented devices or botnets to perform cyber attacks, pilfering money and selling information.
Threats Vectors
- Direct access involves gaining physical access to a target system for malicious activities.
- Removable media like USB drives can become a threat vector for malware.
- Wireless networks can be compromised, especially if they are unsecured.
- Email is used for phishing attacks where attachments or links compromise the target.
- Attackers can inject malware into cloud resources to access user information.
- Ransomware and other malware can take advantage of unpatched vulnerabilities.
- Attackers can compromise the target by exploiting vulnerabilities in third-party vendor resources.
- Business partners can be exploited in supply-chain attacks to access customer information.
Malware
- Malware stands for malicious software
- Attackers may use malware to gain unauthorized access to systems or data
- Malware can damage or disable computer systmes
- Malware gives limited or full control of systems to the malware creator.
- Theft or fraud is the purpose of malware.
- Programmers create malware to attack browsers, track visited websites, slow down systems, cause hardware failure and steal information.
Distribution Techniques
- Attackers distribute malware through black hat SEO, social engineering, spear-phishing sites, malvertising, compromised websites, drive-by downloads, and spam emails.
- Black hat SEO is the use of aggressive SEO tactics to achieve higher search engine rankings for malware pages.
- Social engineering is the insertion of malware into websites to trick users into executing it unknowingly.
- Spear-phishing involves mimicking trusted entities to steal sensitive information.
- Malvertising spreads malware through malicious advertisements.
- Drive-by downloads distribute software unintentionally via exploited browser flaws.
- Attackers can use compromised websites to infect systems with malware.
- Spam emails attach malicious files to compromise machines.
Components of Malware
- Crypters conceal the existence of malware and protect it from antivirus detection.
- Downloaders download additional malicious code from the internet.
- Droppers embed malware files and transport malware to a target by installing before executing.
- Exploits use code that takes advantage of bugs or vulnerabilities to breach system security.
- Injectors inject exploits or malicious code into running processes.
- Obfuscators conceal the malicious code of malware.
- Packers compress malware files into an unreadable format.
- Payloads perform the desired malicious activity when activated.
- Malicious code defines the basic malware functionality, and comprises commands resulting in security breaches in the form of Java Applets, ActiveX Controls, Browser Plug-ins and Pushed Content.
Types of Trojans
- Remote access Trojans (RATs) provide attackers full control over the victim's system.
- Backdoor Trojans bypass standard system authentication.
- Botnet Trojans infect a large number of computers for a command-and-control center.
- Rootkit Trojans attack the root or OS and are hard to detect.
- E-banking Trojans intercept victim's account information targeting online banking.
- Point-of-sale (POS) Trojans target POS equipment to steal credit card data.
- Service protocol Trojans exploit vulnerable service protocols.
- Defacement Trojans can destroy or change the content of a database and target websites for modification.
- Mobile Trojans target mobile phones to steal various credentials/data.
- IoT Trojans attack IoT networks using a botnet.
- Security software disabler Trojans stop security programs.
- Destructive Trojans randomly delete files for malicious reasons.
- DDoS Attack Trojans perform DDoS attacks on target machines.
- Command Shell Trojans provide remote control of a command shell.
Creating a Virus
- Creating a simple virus program involves writing a batch file with commands to copy itself and delete Windows files.
- Game.bat batch file into Game.com using the bat2com utility
- Executing virus will copy itself to other batch files before wiping target folder
- Virus Maker tools allow quick customization of viruses, including disabling Windows features or infecting files.
What is a Virus?
- A virus is a self-replicating program that produces its own copy by attaching itself to programs, boot sectors, or documents
- Virusses spread via file downloads, infected disks/flash drives and email.
- Key characteristics of viruses are: infects other programs, transforms itself, encrypts itself, alters data, corrupts files/programs, replicates itself.
Types of Viruses
- System or Boot Sector Viruses target the system's boot sectors and can spread via email and removable media.
- File Viruses infect files executed or interpreted in the system.
- Multipartite Viruses attack both the boot sector and executable files.
- Macro Viruses infect Microsoft Word or similar applications.
- Cluster Viruses infect files without changes but alter directory entries.
- Stealth/Tunneling Viruses hide from antivirus software by altering service call interrupts.
- Encryption Viruses penetrate systems via various means, using an encrypted copy of the virus with a decryption module.
- Sparse Infector Viruses infect less often to minimize detection.
- Polymorphic Viruses modify their code for each replication to avoid detection.
- Overwriting File or Cavity Viruses overwrite parts of host files without changing the file size.
- Companion Viruses store themselves with the same filename, infecting the system upon execution.
- Shell Viruses form a shell around the target host program's code.
- File Extension Viruses change the extensions of files.
- FAT Viruses attack the File Allocation Table.
- Logic Bomb Viruses trigger in response to a specific event
More Virus Types
- Web Scripting Viruses breach web browser security for client-side scripting.
- Email Viruses perform unexpected actions.
- Add-on Viruses append their code to the host code without changes.
- Armored Viruses designed to confuse antivirus systems
- Direct Action/Transient Viruses transfer all controls of the host code
- Terminate/Stay Resident Viruses remains permanently in the target machine's memory.
- Intrusive Viruses overwrite the host code completely or partly with the viral code.
More on Virus Creation
- A simple virus program can be written using a batch file.
- Virus maker tools can perform harmful tasks.
Ransomware
- Ransomware restricts access to a computer's system files and folders.
- Payment of a ransom is demanded to remove the restrictions.
- Dharma is a ransomware that targets campaigns and demands payment in bitcoins.
eCh0raix Ransomware
- The following is a list of known ransomware: eCh0raix , SamSam , WannaCry, Petya - NotPetya, GandCrab, MegaCortex, LockerGoga, NamPoHyu, Ryuk, Cryptgh0st.
Computer Worms
- The following is a description of computer worms: replicate execut and spread, consume resources and don’t really interact, and hackers backdoor infect
- A worm takes advantage of file or information transport features on computer systems and automatically spreads through the infected network, but a virus does not
- The core difference between a virus and a worm includes the worms ability to exploit, not modify store programs, consumes bandwidth, spreads rapidly and removes easily
Rootkits
- Rootkits hide presence and activities, allowing full access to the server or host.
- These replace system calls and utilities and cause malicious functions.
- A rootkit comprises backdoor programs, DDoS programs, packet sniffers, log-wiping utilities, IRC bots.
How to use Rootkits
- Attackers install rootkits by scanning for vulnerable computers, wrapping it in a special package and installing it on public or corporate computers, and launching a zero-day attack
- Rootkits are used to conceal the host system, mask attacker tracks, gather data, and store programs.
- Scranos, or trojanized rootkits that masquerades, to infect systems and data exfiltration use popular rootkits such as LoJax
- LoJax is used to inject malware into the Boot sector that is hard to detect, and maintains persistence even after OS reinstallation.
- A few popular activities include tools include system settings and access the system SPI, the Serial Peripheral Interfacememory embed UEFI in into firmware image
Potentially Unwanted Applications (PUAs)
- Potentially Unwanted Applications are also known as grayware or junkware.
- These can provide severe risks to data security in installed systems
- They can be installed when downloading third party installers
- The following are more types of PUA: Adware, Torrent, marketing ,Cryptomining and dialers
Adware Characteristics
- Frequent system lag, inundated advertisements, incessant system crash, disparity in browser homeslow web, slow Internet from to the background or
- Ads can lead to affects the processor speed that affects consumed memory
- Common browser includes: toolbars a brand new ones like those mentioned above
- Ads display unrequested ads that create pop up
Spyware
- A stealthy program which reports interaction with data or internet is installed
- The target in order to avoid removal
- Spyware includes drive by download, masking anti- spyware, exploits, piggyback software installations , cookies
- Used actions include stealing information, monitors, displaying annoying pop ups, readix
Common Keylogging Activities
- Keyloggers record every keystroke
- Capture short activities: logging titles ,names of Applications or and
- Monitor, and record all credit card data login names and capture records from online charts
Types of Keyloggers
- Spyrix and refog keyloggers for Mac is what he likes all those keystrokes by spy on the windows
Botnets
- Network of computers that are controlled by a central computer
- Attackers distribute software that is for that network is for a network
Types of Malware
- Fileless malware, infects legitmate software, and leverages existing vulnerabilities in RAM, and can inject code.
- Key characteristics include stealthy, use existing components, or existing tools include the Stealthy in nature exploit the system tools are the living off the length the land
Types of Fileless Malware
- These often target applications like legitimate applications at our applications and or operating systems that can include the use of preinstalled tool and file systems
- Infection is lateral movement as the system can also be a source for the spread
Final Key Points
- Vulnerability refers to the existence of weaknesses that will be exploited by agents.
- Common drivers of vulnerability are by the misconfiguration and insecurity.
- Misconfigurations arise from insecure protocols and lack of patches.
- Impacts for these misconfigurations may vary, including data and denial of service
- Risks referred to are the potential to do so that also vary according to what information is stolen
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.