Understanding Cyber Threats to Organizations

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the primary function of a crypter in the context of malware?

  • To conceal the existence of malware. (correct)
  • To delete files on a target system.
  • To inject the main malware code into other running processes.
  • To replicate itself across a network.

Which type of threat actor is most likely to use freely available online tools to attempt network attacks primarily out of curiosity?

  • State-sponsored hackers
  • Script kiddies (correct)
  • Organized hackers
  • Industrial spies

Which type of malware is specifically designed to provide a remote attacker with full control over a victim's system?

  • Rootkit
  • Fileless Malware
  • Remote Access Trojan (correct)
  • Ransomware

An organization discovers that its customer database has been copied and sold to a competitor. Which threat actor is most likely responsible?

<p>Industrial spy (D)</p> Signup and view all the answers

Which of the following best describes a 'logic bomb' in the context of computer security?

<p>Malicious code triggered by a specific event or time. (D)</p> Signup and view all the answers

An organization's website is defaced with political messages. Which threat actor is most likely responsible?

<p>Hacktivist (B)</p> Signup and view all the answers

Which of the following is a key characteristic that distinguishes a worm from a virus?

<p>A worm spreads more rapidly than a virus. (C)</p> Signup and view all the answers

Which of these scenarios describes the exploitation of a vulnerability through a 'supply chain' threat vector?

<p>An attacker exploits a vulnerability in a third-party vendor's software. (A)</p> Signup and view all the answers

Which type of threat is characterized by natural events that can potentially harm an organization's assets?

<p>Natural threat (D)</p> Signup and view all the answers

Which of the following is the best definition of a threat vector?

<p>A medium through which an attacker gains access to a system. (B)</p> Signup and view all the answers

Which of the following best describes the purpose of a packer in the context of malware?

<p>To compress the malware file to convert the code and data of the malware into an unreadable format. (B)</p> Signup and view all the answers

Which of the following is a common technique used by attackers to distribute malware through the web by embedding malware in ad networks?

<p>Malvertising (D)</p> Signup and view all the answers

What is the primary goal of 'black hat' search engine optimization (SEO) in the context of malware distribution?

<p>To achieve higher search engine rankings for malware pages. (C)</p> Signup and view all the answers

Which of the following is an example of a potential consequence of 'data exfiltration' caused by a vulnerability?

<p>Funds are stolen from customer accounts. (B)</p> Signup and view all the answers

What is a 'sparse infector' virus designed to do in order to avoid antivirus detection?

<p>Infect less often and try to minimize their probability of discovery. (D)</p> Signup and view all the answers

A company discovers that a disgruntled ex-employee used their privileged access to corrupt valuable resources. Which type of threat does this scenario represent?

<p>Internal threat (B)</p> Signup and view all the answers

Which of the following best characterizes a 'direct action' or 'transient' virus?

<p>It infects application files. (B)</p> Signup and view all the answers

Which type of Trojan can modify the HTML content displayed on specific websites targeted by attackers?

<p>Defacement Trojans (C)</p> Signup and view all the answers

A technician discovers that a system's antivirus software is disabled and the default background has changed. Which type of malware infection is indicated by these activities?

<p>Trojan (C)</p> Signup and view all the answers

Which of the following describes the primary characteristic of 'fileless malware'?

<p>It resides primarily in the system's RAM. (B)</p> Signup and view all the answers

What primarily drives organizations to become subject to 'system sprawl/undocumented assets' vulnerabilities?

<p>An increased number of server connections without proper documentation. (A)</p> Signup and view all the answers

An organization’s web server becomes unresponsive due to a flood of traffic originating from numerous compromised systems. Which type of malware is most likely involved?

<p>Botnet (A)</p> Signup and view all the answers

What characteristic of a system's hardware or software is best described as a weakness?

<p>Vulnerability (C)</p> Signup and view all the answers

Which security risk is primarily associated with the failure to change default settings on newly deployed network devices?

<p>Exploitable known vulnerabilities and easy access for attackers (B)</p> Signup and view all the answers

Software vendors provide patches that reduce the probability of threats doing what?

<p>Exploitations (B)</p> Signup and view all the answers

Which of the following is primarily compromised due to lack of end-user awareness?

<p>The network (C)</p> Signup and view all the answers

The risk for an entity that involves connecting to another entity, that later becomes infected by a cybersecurity threat stems from?

<p>Third-Party Risks (B)</p> Signup and view all the answers

Which risk to financial or user information for an entity is caused by obsolete or familiar codes?

<p>Legacy Platform Vulnerabilities (B)</p> Signup and view all the answers

What name is given to private keys that are not stored in a highly secured environment?

<p>Improper Certificate and Key Management (A)</p> Signup and view all the answers

Which one of the following represents a risk that connects to financial or user information compromise?

<p>System Sprawl/Undocumented Assets (A)</p> Signup and view all the answers

While the primary concern when using a device for the first time is usability, what concern should follow usability?

<p>Security (D)</p> Signup and view all the answers

In a situation where computer use is significantly affected due to new browser add-ons being installed, what may be the cause?

<p>Adware (C)</p> Signup and view all the answers

You visit a website and discover that it scans your device's files, and plugins. The system then detects a vulnerability and acts on this. What type of attack is this?

<p>Fileless Propagation Techniques (D)</p> Signup and view all the answers

Which of the following allows legitimate packages in a system in order to run malware in that system?

<p>Native applications. (A)</p> Signup and view all the answers

What is indicated when more resources are required by the system for less output?

<p>A virus. (B)</p> Signup and view all the answers

Why would a hacker employ different ways or variations when carrying out similar activities using an application?

<p>To make it harder to be tracked. (A)</p> Signup and view all the answers

When the system tries to hide from virus programs by actively changing and corrupting the service call, what type of virus behavior is being demonstrated?

<p>Tunelling. (A)</p> Signup and view all the answers

Which stage of cybersecurity is defined as a threat infecting a certain targeted system?

<p>The replication stage. (C)</p> Signup and view all the answers

When users install freeware that secretly monitors settings in your system, what type of application is this?

<p>Potentially Unwanted Application (B)</p> Signup and view all the answers

Which of the following activities represents the most direct realization of a cyber threat?

<p>An attacker successfully exploiting a vulnerability to steal sensitive data. (A)</p> Signup and view all the answers

If a company's server becomes unavailable due to a severe weather event damaging its physical location, this scenario is categorized under which type of threat source?

<p>Natural Threat (C)</p> Signup and view all the answers

What distinguishes structured external threats from unstructured ones in the context of cybersecurity?

<p>Structured threats are carried out by technically skilled attackers, while unstructured threats are not. (D)</p> Signup and view all the answers

In the context of cybersecurity threat actors, what is the primary characteristic that distinguishes a 'hacktivist'?

<p>They aim to promote a political agenda by hacking. (A)</p> Signup and view all the answers

Which characteristic identifies a state-sponsored hacker group from other cyber threat actors?

<p>They're hired by the government to collect classified data and harm systems of other organizations. (D)</p> Signup and view all the answers

What is the key differentiator between a 'black hat' hacker and a 'white hat' hacker?

<p>Black hats use their skills for malicious purposes, while white hats use their skills for defensive purposes. (B)</p> Signup and view all the answers

Which of the following scenarios demonstrates the exploitation of the 'removable media' threat vector?

<p>Malware automatically running from a USB drive plugged into a company computer. (C)</p> Signup and view all the answers

How does a supply chain attack operate as a threat vector to compromise an organization's security?

<p>By exploiting vulnerabilities in third-party vendors and their resources to access the organization's systems. (A)</p> Signup and view all the answers

An attacker injects malicious code into cloud resources to access user information. What kind of attack vector is this?

<p>Cloud (B)</p> Signup and view all the answers

A company finds out that its systems have been infected with Trojans, adware, and fileless malware. What kind of attack vector is this?

<p>Ransomware/malware (C)</p> Signup and view all the answers

Which component of malware hides it from antivirus programs and makes reverse engineering difficult?

<p>Crypter (C)</p> Signup and view all the answers

An employee installs an application from an untrusted website that monitors keyboard input and steals financial information. This is an example of:

<p>Trojan (D)</p> Signup and view all the answers

A program infects a system, modifies the Master Boot Record (MBR), and spreads through email attachments. What type of malware is this?

<p>Multipartite Virus (A)</p> Signup and view all the answers

A file infects MS Word files through Visual Basic for Applications (VBA). What type of virus is this?

<p>Macro Virus (D)</p> Signup and view all the answers

Which type of virus conceals its code by actively altering and corrupting service call interrupts while running?

<p>Stealth/Tunneling Virus (A)</p> Signup and view all the answers

A virus that is made using freeware/shareware, torrents, and fake advertisements is what type of virus?

<p>Encryption Virus (B)</p> Signup and view all the answers

Which malware replicates independently, consumes computing resources, and spreads across network connections?

<p>Worm (C)</p> Signup and view all the answers

What action is a key result from a 'bot herder'?

<p>Creating a network via command-and-control center. (C)</p> Signup and view all the answers

Which characteristic is most indicative of fileless malware?

<p>It depends on the exploitation of RAM. (A)</p> Signup and view all the answers

Why is it challenging to defend against fileless malware compared to traditional malware?

<p>Because it uses already known and safe tools. (C)</p> Signup and view all the answers

When a program is secretly tracking the system's setting without user consent, what type of malware application is this?

<p>Spyware (C)</p> Signup and view all the answers

What type of application floods users with online services when browsing the internet?

<p>Adware (B)</p> Signup and view all the answers

Which of the is an inherent indicator of potential Adware?

<p>Frequent Crash System (D)</p> Signup and view all the answers

How do attackers use keystroke loggers?

<p>To monitor each keystroke. (B)</p> Signup and view all the answers

Which reason explains how risk to security occur?

<p>By looking at the weaknesses (D)</p> Signup and view all the answers

An entity decides not to use IDS or Firewall. What kind of design can result for the entity?

<p>Insecure Design (A)</p> Signup and view all the answers

When there is a failure to apply fixes that target bugs. What technological aspect is being addressed?

<p>Poor patch management (C)</p> Signup and view all the answers

A technician uses simple passwords that can easily be cracked. How those act as a risk?

<p>Default Passwords (A)</p> Signup and view all the answers

What vulnerability is created when there are systems and servers made available, but without proper documentation?

<p>System Sprawl (B)</p> Signup and view all the answers

What is the security risk when there are older versions involved in technology?

<p>Obsolete (D)</p> Signup and view all the answers

When there are outdated keys connected to a key management system, what attack can this be?

<p>Data Exfiltration (B)</p> Signup and view all the answers

Company A has outsourced its data in the cloud without the proper documentation. What type of risk is this?

<p>Vendor Management (C)</p> Signup and view all the answers

What is the implication when there is a system sprawl in place.

<p>There maybe system or server connections that happened without documentation (C)</p> Signup and view all the answers

Which impact refers to potential theft of the personal or financial information?

<p>Identity Theft (A)</p> Signup and view all the answers

Which impact refers to attackers preventing users from accessing websites and resources?

<p>Denial of Service (A)</p> Signup and view all the answers

How is that systems lose revenue?

<p>By having to pay for recover of damages (B)</p> Signup and view all the answers

When there is a breach what causes an entity to be required to sanctions and fines?

<p>Legal Consequences (A)</p> Signup and view all the answers

Which of the following scenarios exemplifies an intentional threat originating from within an organization?

<p>A terminated employee intentionally corrupts critical company data before their access is revoked. (A)</p> Signup and view all the answers

How are 'structured external threats' distinguished from 'unstructured external threats'?

<p>Structured threats use sophisticated tools and techniques; unstructured threats use easily accessible tools with less skill. (B)</p> Signup and view all the answers

What is the primary motivation behind state-sponsored hackers targeting another country's information systems?

<p>To gather intelligence, detect vulnerabilities, and damage systems of other governments or military organizations. (D)</p> Signup and view all the answers

What characteristic differentiates a 'black hat' hacker from a 'gray hat' hacker?

<p>Black hats operate without permission for malicious purposes; gray hats may operate offensively and defensively, sometimes without permission. (C)</p> Signup and view all the answers

How does a 'drive-by download' compromise a user's system?

<p>By exploiting vulnerabilities in browser software when a user visits a compromised website. (B)</p> Signup and view all the answers

Which of the following best describes the function of an 'obfuscator' in malware?

<p>To conceal the malicious code of malware, making it difficult for security mechanisms to detect or remove it. (C)</p> Signup and view all the answers

An employee downloads a program that, along with its stated functionality, secretly installs a keylogger. What type of malware is this application considered?

<p>Trojan (D)</p> Signup and view all the answers

A user notices their computer screen intermittently blinking, inverting colors, and displaying everything backward. Which type of malware infection is suggested by these indicators?

<p>Trojan (C)</p> Signup and view all the answers

A company's security team discovers an application on an employee's computer connecting to a remote server and logging keystrokes. What type of malware is most likely present?

<p>Keylogger (A)</p> Signup and view all the answers

What is the key difference between a virus and a worm in terms of propagation?

<p>Viruses require a host file to propagate; worms can spread independently. (D)</p> Signup and view all the answers

An attacker has successfully created a botnet. How would an attacker leverage this network of infected computers?

<p>To launch a distributed denial-of-service (DDoS) attack. (A)</p> Signup and view all the answers

Which of the following is a primary characteristic that makes fileless malware difficult to detect?

<p>It resides in the system's RAM and infects legitimate software, applications, and processes. (B)</p> Signup and view all the answers

A user is experiencing frequent pop-up ads, redirections to unfamiliar websites, and a new toolbar in their browser that they did not install. What might cause this activity?

<p>Adware infection. (B)</p> Signup and view all the answers

Your computer has been infected with a program displaying unsolicited sales and pop-ups. What type of PUA is it?

<p>Adware (D)</p> Signup and view all the answers

Which of the following best describes a 'zero-day vulnerability'?

<p>A vulnerability that is known to attackers but not yet patched by the software vendor. (A)</p> Signup and view all the answers

Why does failing to change default settings on network devices create a vulnerability?

<p>It makes it easier for attackers to guess the necessary configurations to compromise the system. (A)</p> Signup and view all the answers

An organization neglects to document new systems and server connections. Which kind of vulnerability is likely to arise?

<p>System Sprawl (B)</p> Signup and view all the answers

Leaked database credentials have led to external exploitation of the database. Classify the issue.

<p>Design Flaw (D)</p> Signup and view all the answers

What is the primary risk associated with using unsupported legacy platforms within an organization's infrastructure?

<p>Are caused by obsolete and familiar systems. (B)</p> Signup and view all the answers

Why should private keys used with certificates always be stored in a highly secured environment?

<p>This prevents unauthorized individuals from intercepting the keys and gaining access to confidential data or critical systems. (A)</p> Signup and view all the answers

Flashcards

What is a Threat?

A potential occurrence of an undesirable event that can eventually cause damage or disrupt operations.

Examples of Threats

Stealing sensitive data, causing server shutdowns, tricking employees, or infecting systems with malware.

Natural Threats

Threats from natural events like fires and floods.

Unintentional Threats

Threats from unintentional human errors, negligence, or accidents.

Signup and view all the flashcards

Intentional Threats

Deliberate actions and or insider attacks or external attacks by skilled or unskilled hackers.

Signup and view all the flashcards

Black Hats

Skilled hackers with malicious intent.

Signup and view all the flashcards

White Hats

Ethical hackers using skills for defensive purposes.

Signup and view all the flashcards

Gray Hats

Hackers working both offensively and defensively.

Signup and view all the flashcards

Suicide Hackers

Hackers bringing down critical infrastructure for a cause.

Signup and view all the flashcards

Script Kiddies

Unskilled hackers using premade scripts and tools.

Signup and view all the flashcards

Cyber Terrorists

Individuals seeking disruption of computer networks via religious or political motivations.

Signup and view all the flashcards

State-Sponsored Hackers

Government-employed hackers for espionage and system damage.

Signup and view all the flashcards

Hacktivist

Individuals promoting a political agenda through hacking.

Signup and view all the flashcards

Hacker Teams

Collaborative skilled hackers with resources and funding dedicated to advanced research and coordinated attacks.

Signup and view all the flashcards

Industrial Spies

Individuals performing corporate espionage for competitive advantage.

Signup and view all the flashcards

Insider

Trusted individuals misusing critical access within an organization.

Signup and view all the flashcards

Criminal Syndicates

Organized groups involved in planned criminal schemes planned to embezzele money.

Signup and view all the flashcards

Organized Hackers

Criminals renting botnets to pilfer money through cyber-attacks.

Signup and view all the flashcards

Threat Vector

The medium that an attacker gains access to a system through.

Signup and view all the flashcards

Direct access

Gaining physical access to perform malicious activities.

Signup and view all the flashcards

Removable media

Using USBs to spread malware, steal, or corrupt files.

Signup and view all the flashcards

Wireless

Compromising unsecured wireless connections and networks.

Signup and view all the flashcards

Email

Using phishing emails with malicious attachments for system compromise.

Signup and view all the flashcards

Cloud

Malware injected to control cloud resources and user data.

Signup and view all the flashcards

Ransomware/malware

Using unpatched vulnerabilities to inject ransomware and malware.

Signup and view all the flashcards

Supply chain

Compromising vulnerabilities within a third-party supply chain.

Signup and view all the flashcards

Business partners

Attacking through business partnerships and third party organizations.

Signup and view all the flashcards

What is Malware?

Malicious software damaging computer systems and giving creators control.

Signup and view all the flashcards

Malware System Entry

Instant messengers, removable devices and email attachments.

Signup and view all the flashcards

Crypter

A program that conceals the existence of malware.

Signup and view all the flashcards

Downloader

A type of Trojan that downloads other malware from the Internet.

Signup and view all the flashcards

Dropper

A type of malware that downloads other malware from the Internet.

Signup and view all the flashcards

Exploit

Code that takes advantage of a vulnerability to breach system security.

Signup and view all the flashcards

Injector

Program injecting malicious code into other running processes.

Signup and view all the flashcards

Obfuscator

Program concealing malicious code of malware.

Signup and view all the flashcards

Packer

Software compressing malware file to mask its contents.

Signup and view all the flashcards

Payload

Part of malware performing the desired malicious activity.

Signup and view all the flashcards

Malicious Code

The actual code causing security breaches in malware.

Signup and view all the flashcards

What is a Trojan?

A program disguised as harmless, used to gain control and steal data.

Signup and view all the flashcards

Remote Access Trojans

Remote Access Trojans (RATs) provide attackers with full control over the victim's system.

Signup and view all the flashcards

Backdoor Trojans

Bypasses authentication/firewalls, and gives hackers backdoor access to your computer.

Signup and view all the flashcards

Botnet Trojans

Tricks users into trojans downloading and creates a network of controllled bots.

Signup and view all the flashcards

Rootkit Trojans

Potent backdoors grant root/admin-level access system, by observings services. Rootkits cannot be spotted and provide full full control

Signup and view all the flashcards

E-banking Trojans

These intercept victim data and are dangerous.

Signup and view all the flashcards

Point-of-Sale Trojans

Targets systems to steals credit.

Signup and view all the flashcards

Defacement Trojans

Destroys entire system, or website contents.

Signup and view all the flashcards

Service Protocol Trojans

Performs attack through VNC, DNS protocols.

Signup and view all the flashcards

Mobile Trojans

Malicious codes that makes and targets mobile phones.

Signup and view all the flashcards

Security Software D

Software that targets to stop securities programs from workings.

Signup and view all the flashcards

What is a Virus?

A malicious programs that can copy itself and infect PC.

Signup and view all the flashcards

Virus Characteristic

Infections, transforming itself and encryption.

Signup and view all the flashcards

Study Notes

Threats

  • A threat refers to something that can cause damage and disrupt operational activities of an organization.
  • Attackers use threats to infiltrate and steal data, such as personal info, financial info, and login credentials.

Examples of Threats

  • An attacker stealing sensitive data.
  • An attacker causing a server to shut down.
  • An attacker tricking an employee into revealing sensitive information.
  • An attacker infecting a system with malware.
  • An attacker spoofing the identity of an authorized person to gain access.
  • An attacker modifying or tampering with data transferred over a network.
  • An attacker remotely altering data in a database server.
  • An attacker performing URL redirection or forwarding.
  • An attacker performing privilege escalation for unauthorized access.
  • An attacker executing a denial-of-service (DoS) attack for making resources unavailable.
  • An attacker eavesdropping on a communication channel without authorization.

Threat Sources

  • Threats can be classified into natural, unintentional, and intentional
  • Natural threats include fires, floods and power failures and have the potential to cause physical damage to computer systems
  • Unintentional threats originate from insider security breaches, negligence, operator errors, unskilled administrators, or untrained employees
  • Intentional threats include insiders or internal attacks performed by disgruntled or negligent employees that intentionally/unintentionally harm the organization.
  • Most computer and internet related crimes are internal attacks performed by individuals within the organization
  • External attacks exploit vulnerabilities already present in a network, and the potential severity is dependent on identified network weaknesses
  • Structured external threats are implemented by technically skilled attackers who use tools to gain access into a network with the intention of disrupting services
  • The motivation behind structured attacks can vary but includes criminal bribes, racism, politics, and terrorism
  • Structured external threats include examples like distributed ICMP floods, spoofing and simultaneously executing attacks from multiple sources
  • Unstructured external threats are performed by unskilled attackers, aspiring hackers, and are typically based on curiosity rather than criminal intent.
  • Unstructured external attacks can be easily prevented with port scanning and address sweeping security solutions
  • An example is using freely available online tools to attack a network or crash a website

Threat Actors/Agents

  • Black hats use their extraordinary computing skills for illegal/malicious purposes, often engaging in criminal activities, and are also know as crackers.
  • White hats (penetration testers) use their hacking skills for defensive purposes with permission from the system owner, such as security analysts knowledgeable about countermeasures.
  • Gray hats work both offensively and defensively at various times, helping hackers find vulnerabilities while assisting vendors to improve products (software/hardware).
  • Suicide hackers aim to bring down critical infrastructure for a cause and are unconcerned about facing jail terms or other punishment.
  • Script kiddies are unskilled hackers using scripts, tools, and software developed by real hackers, focusing on the quantity of attacks instead of quality.
  • Cyber terrorists with religious or political motivations aim to create fear through large-scale disruption of computer networks
  • State-sponsored hackers, employed by governments, seek to penetrate systems, gain top-secret information, and damage other governments.
  • Industrial spies perform corporate espionage to steal critical information like blueprints and formulas, often using advanced persistent threats (APTs) and social engineering.
  • Insiders are employees (trusted persons) with critical asset access who use their privileges to violate rules or harm the organization's systems, often due to disgruntled or terminated status.
  • Hacker teams are skilled hackers with resources and funding working together to research state-of-the-art technologies
  • Criminal Syndicates are part of organized and prolonged criminal activities that exploit victims from distinct jurisdictions' to embezzle money through cyber attacks.
  • Hackivists hack into government or corporate computer systems as a form of activism.
  • Organized hackers are groups of hackers that work together in criminal activities that sell the information to the highest bidder.

Attributes of Threat Actors

  • Internal actors are trusted insiders with authorized access to resources.
  • External actors are outsiders with no authorized access but physical resources.
  • Highly sophisticated threat actors are more successful than less sophisticated ones.
  • Resources/funding determines how a threat actor supports an attack financially or with tools.
  • Intent/motivation of threat actors can be connected to political/personal goals, making them more likely to launch an attack.

Threat Vectors

  • Direct access is where the attacker gains physical access to the target system and performs malicious activities.
  • Removable Media is where devices such as USB drives, phones, and printers become a way for malware to run automatically on the system.
  • Wireless is where corporate devices can be comprised through unsecured wirless hotspots and/or credentials being stolen.
  • Email sends phishing attacks containing malicious attachments that allow attackers to compromise their targets.
  • Cloud contains injected malware into cloud resources to gain access to user information.
  • Ransomware/Malware takes advantage of unpatched vulnerabilities as well as malware to infiltrate an organization.
  • Supply chain attempts to compromise the target by exploiting vulnerabilities in the resources supplies by 3rd party vendors
  • Business partners are third-party organizations that emerge as a threat vector.

Autorun.inf Mitigation

  • Autorun.inf is a file that when executed, runs executables listed in the file and displays the file.
  • To mitigate the autorun.inf threat, the Autostart functionality should be turned off.

Common Malware Distribution Techniques

  • Black hat SEO ranks malware highly in search results.
  • Social Engineered Click-jacking tricks users into clicking on innocent looking webpages.
  • Spear-phishing mimics legitimate institutions in an attempt to steal login credentials.
  • Malvertising embeds malware in ad networks to displays across hundreds of legitimate, high-traffic sites
  • Compromised legitimate websites host embedded malware that spreads to unsuspecting visitors.
  • Drive-by-downloads uses browser flaws to install malware just by visiting a webpage.
  • Spam emails attaches the malware to emails and tricks victims to click the attachment.

General Malware Components

  • Crypters conceal the existence of malware.
  • Downloaders used by trojans download malicious code
  • Droppers are covert carriers to embed malware files in order to perform an installation task
  • Exploits contain commands to take advantage of bugs/vulnerabilities, breaking security through software vulnerabilities. Local (inside network) and remote (outside network) exploits
  • Injectors inject malicious code into code into vulnerable running processes and changes methods
  • Obfuscators conceals malicious code via various techniques for difficulty.
  • Packers compress the malware file by compressing into unreadable format.
  • Payloads perform the desired activity once activated that may modify or delete files, open ports etc.
  • Malicious code defines the basic functionality of malware. Can take various forms Java Applets, ActiveX Controls, Browser Plug-ins and Pushed Content

Trojan Indications

  • The DVD ROM drawer opens and closes automatically.
  • The compute screen blinking, flips upside down, or is inverted so that everything is displayed backward.
  • Printers automatically start printing documents
  • A web page suddenly opening without input from the user
  • The color settings of the operating system changes automatically.
  • Screensavers convert to a personal scrolling message/advertisements.
  • The sound volume suddenly fluctuates
  • Date and time of the computer changes.
  • Mouse courser moves by itself.
  • The left-and right-click functions of the mouse are interchanged.
  • The mouse pointer disappears compeltely.
  • The mouse pointer automatically clicks on icons and is uncontrollable.
  • The Windows start button disappears.
  • Pop-ups with bizarre messages appear unexpectedly.
  • Clipboard images/text appearing to be manipulated.
  • The keyboard and mouse freeze.
  • Contacts receive emails that the user did not send.
  • Strange warnings or question boxes appear.
  • System turns off and restarts in unusual way.
  • The taskbar disappears automatically due to a Trojan.
  • The Task manager is disabled by a Trojan.
  • Antivirus programs are automatically disabled and corrupted/altered/deleted from the systems data.

Types of Trojans

  • Remote Access Trojans (RATs) give attackers full control of the victim's system to remotely access files and private conversations.
  • Backdoor Trojans are programs that bypass standard authentication mechanisms to leverage backdoor programs in order to access the victim's computer without detection, as it is performed without the user's knowledge.
  • Botnet Trojans are leveraged to infect a large amount of computers to create bot herders that can command said botnets to be used for attacks on targets.
  • Rootkit Trojans are designed to get admin level access to a system that's difficult to detect by observing services, system task lists, or registries.
  • E-banking trojans intercept account information before the system an encrypt it and send it to the attack command-and-control.

Trojan Uses

  • Deeting critical operating system files.
  • Disabling firewalls and antivirus.
  • Create backdoors to gain remote access
  • Use a victim's pc for spamming.
  • Steal personal information such as security codes and passwords.
  • Download spyware, adware, malware.
  • Encrypt and lock out victims from accessing the system.

Types of Viruses

  • System or Boot Sector infects system sectors including the master boot record (MBR) and the DOS boot record system sectors
  • Email attachments and removable media (USB drives) are the primary carriers
  • File Viruses infect files executed or interpreted in the system, such as COM, EXE, SYS, OVL, OBJ, PRG, MNU, and BAT files
  • inserts their code into the original file and infect executable files
  • Multipartite Virus (hybrid virus) combines the approach of file infectors and boot record infectors, simultaneously attacking both the boot sector and the executable or program files.
  • Macro viruses infect Microsoft Word and similar applications, written in the macro language Visual Basic
  • Cluster clusters infect files without changing the file or planting additional files
  • Stealth/Tunneling alter and corrupts corrupting services to hide from anti-virus programs

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser