Podcast
Questions and Answers
Which of the following best describes the primary function of a crypter in the context of malware?
Which of the following best describes the primary function of a crypter in the context of malware?
- To conceal the existence of malware. (correct)
- To delete files on a target system.
- To inject the main malware code into other running processes.
- To replicate itself across a network.
Which type of threat actor is most likely to use freely available online tools to attempt network attacks primarily out of curiosity?
Which type of threat actor is most likely to use freely available online tools to attempt network attacks primarily out of curiosity?
- State-sponsored hackers
- Script kiddies (correct)
- Organized hackers
- Industrial spies
Which type of malware is specifically designed to provide a remote attacker with full control over a victim's system?
Which type of malware is specifically designed to provide a remote attacker with full control over a victim's system?
- Rootkit
- Fileless Malware
- Remote Access Trojan (correct)
- Ransomware
An organization discovers that its customer database has been copied and sold to a competitor. Which threat actor is most likely responsible?
An organization discovers that its customer database has been copied and sold to a competitor. Which threat actor is most likely responsible?
Which of the following best describes a 'logic bomb' in the context of computer security?
Which of the following best describes a 'logic bomb' in the context of computer security?
An organization's website is defaced with political messages. Which threat actor is most likely responsible?
An organization's website is defaced with political messages. Which threat actor is most likely responsible?
Which of the following is a key characteristic that distinguishes a worm from a virus?
Which of the following is a key characteristic that distinguishes a worm from a virus?
Which of these scenarios describes the exploitation of a vulnerability through a 'supply chain' threat vector?
Which of these scenarios describes the exploitation of a vulnerability through a 'supply chain' threat vector?
Which type of threat is characterized by natural events that can potentially harm an organization's assets?
Which type of threat is characterized by natural events that can potentially harm an organization's assets?
Which of the following is the best definition of a threat vector?
Which of the following is the best definition of a threat vector?
Which of the following best describes the purpose of a packer in the context of malware?
Which of the following best describes the purpose of a packer in the context of malware?
Which of the following is a common technique used by attackers to distribute malware through the web by embedding malware in ad networks?
Which of the following is a common technique used by attackers to distribute malware through the web by embedding malware in ad networks?
What is the primary goal of 'black hat' search engine optimization (SEO) in the context of malware distribution?
What is the primary goal of 'black hat' search engine optimization (SEO) in the context of malware distribution?
Which of the following is an example of a potential consequence of 'data exfiltration' caused by a vulnerability?
Which of the following is an example of a potential consequence of 'data exfiltration' caused by a vulnerability?
What is a 'sparse infector' virus designed to do in order to avoid antivirus detection?
What is a 'sparse infector' virus designed to do in order to avoid antivirus detection?
A company discovers that a disgruntled ex-employee used their privileged access to corrupt valuable resources. Which type of threat does this scenario represent?
A company discovers that a disgruntled ex-employee used their privileged access to corrupt valuable resources. Which type of threat does this scenario represent?
Which of the following best characterizes a 'direct action' or 'transient' virus?
Which of the following best characterizes a 'direct action' or 'transient' virus?
Which type of Trojan can modify the HTML content displayed on specific websites targeted by attackers?
Which type of Trojan can modify the HTML content displayed on specific websites targeted by attackers?
A technician discovers that a system's antivirus software is disabled and the default background has changed. Which type of malware infection is indicated by these activities?
A technician discovers that a system's antivirus software is disabled and the default background has changed. Which type of malware infection is indicated by these activities?
Which of the following describes the primary characteristic of 'fileless malware'?
Which of the following describes the primary characteristic of 'fileless malware'?
What primarily drives organizations to become subject to 'system sprawl/undocumented assets' vulnerabilities?
What primarily drives organizations to become subject to 'system sprawl/undocumented assets' vulnerabilities?
An organization’s web server becomes unresponsive due to a flood of traffic originating from numerous compromised systems. Which type of malware is most likely involved?
An organization’s web server becomes unresponsive due to a flood of traffic originating from numerous compromised systems. Which type of malware is most likely involved?
What characteristic of a system's hardware or software is best described as a weakness?
What characteristic of a system's hardware or software is best described as a weakness?
Which security risk is primarily associated with the failure to change default settings on newly deployed network devices?
Which security risk is primarily associated with the failure to change default settings on newly deployed network devices?
Software vendors provide patches that reduce the probability of threats doing what?
Software vendors provide patches that reduce the probability of threats doing what?
Which of the following is primarily compromised due to lack of end-user awareness?
Which of the following is primarily compromised due to lack of end-user awareness?
The risk for an entity that involves connecting to another entity, that later becomes infected by a cybersecurity threat stems from?
The risk for an entity that involves connecting to another entity, that later becomes infected by a cybersecurity threat stems from?
Which risk to financial or user information for an entity is caused by obsolete or familiar codes?
Which risk to financial or user information for an entity is caused by obsolete or familiar codes?
What name is given to private keys that are not stored in a highly secured environment?
What name is given to private keys that are not stored in a highly secured environment?
Which one of the following represents a risk that connects to financial or user information compromise?
Which one of the following represents a risk that connects to financial or user information compromise?
While the primary concern when using a device for the first time is usability, what concern should follow usability?
While the primary concern when using a device for the first time is usability, what concern should follow usability?
In a situation where computer use is significantly affected due to new browser add-ons being installed, what may be the cause?
In a situation where computer use is significantly affected due to new browser add-ons being installed, what may be the cause?
You visit a website and discover that it scans your device's files, and plugins. The system then detects a vulnerability and acts on this. What type of attack is this?
You visit a website and discover that it scans your device's files, and plugins. The system then detects a vulnerability and acts on this. What type of attack is this?
Which of the following allows legitimate packages in a system in order to run malware in that system?
Which of the following allows legitimate packages in a system in order to run malware in that system?
What is indicated when more resources are required by the system for less output?
What is indicated when more resources are required by the system for less output?
Why would a hacker employ different ways or variations when carrying out similar activities using an application?
Why would a hacker employ different ways or variations when carrying out similar activities using an application?
When the system tries to hide from virus programs by actively changing and corrupting the service call, what type of virus behavior is being demonstrated?
When the system tries to hide from virus programs by actively changing and corrupting the service call, what type of virus behavior is being demonstrated?
Which stage of cybersecurity is defined as a threat infecting a certain targeted system?
Which stage of cybersecurity is defined as a threat infecting a certain targeted system?
When users install freeware that secretly monitors settings in your system, what type of application is this?
When users install freeware that secretly monitors settings in your system, what type of application is this?
Which of the following activities represents the most direct realization of a cyber threat?
Which of the following activities represents the most direct realization of a cyber threat?
If a company's server becomes unavailable due to a severe weather event damaging its physical location, this scenario is categorized under which type of threat source?
If a company's server becomes unavailable due to a severe weather event damaging its physical location, this scenario is categorized under which type of threat source?
What distinguishes structured external threats from unstructured ones in the context of cybersecurity?
What distinguishes structured external threats from unstructured ones in the context of cybersecurity?
In the context of cybersecurity threat actors, what is the primary characteristic that distinguishes a 'hacktivist'?
In the context of cybersecurity threat actors, what is the primary characteristic that distinguishes a 'hacktivist'?
Which characteristic identifies a state-sponsored hacker group from other cyber threat actors?
Which characteristic identifies a state-sponsored hacker group from other cyber threat actors?
What is the key differentiator between a 'black hat' hacker and a 'white hat' hacker?
What is the key differentiator between a 'black hat' hacker and a 'white hat' hacker?
Which of the following scenarios demonstrates the exploitation of the 'removable media' threat vector?
Which of the following scenarios demonstrates the exploitation of the 'removable media' threat vector?
How does a supply chain attack operate as a threat vector to compromise an organization's security?
How does a supply chain attack operate as a threat vector to compromise an organization's security?
An attacker injects malicious code into cloud resources to access user information. What kind of attack vector is this?
An attacker injects malicious code into cloud resources to access user information. What kind of attack vector is this?
A company finds out that its systems have been infected with Trojans, adware, and fileless malware. What kind of attack vector is this?
A company finds out that its systems have been infected with Trojans, adware, and fileless malware. What kind of attack vector is this?
Which component of malware hides it from antivirus programs and makes reverse engineering difficult?
Which component of malware hides it from antivirus programs and makes reverse engineering difficult?
An employee installs an application from an untrusted website that monitors keyboard input and steals financial information. This is an example of:
An employee installs an application from an untrusted website that monitors keyboard input and steals financial information. This is an example of:
A program infects a system, modifies the Master Boot Record (MBR), and spreads through email attachments. What type of malware is this?
A program infects a system, modifies the Master Boot Record (MBR), and spreads through email attachments. What type of malware is this?
A file infects MS Word files through Visual Basic for Applications (VBA). What type of virus is this?
A file infects MS Word files through Visual Basic for Applications (VBA). What type of virus is this?
Which type of virus conceals its code by actively altering and corrupting service call interrupts while running?
Which type of virus conceals its code by actively altering and corrupting service call interrupts while running?
A virus that is made using freeware/shareware, torrents, and fake advertisements is what type of virus?
A virus that is made using freeware/shareware, torrents, and fake advertisements is what type of virus?
Which malware replicates independently, consumes computing resources, and spreads across network connections?
Which malware replicates independently, consumes computing resources, and spreads across network connections?
What action is a key result from a 'bot herder'?
What action is a key result from a 'bot herder'?
Which characteristic is most indicative of fileless malware?
Which characteristic is most indicative of fileless malware?
Why is it challenging to defend against fileless malware compared to traditional malware?
Why is it challenging to defend against fileless malware compared to traditional malware?
When a program is secretly tracking the system's setting without user consent, what type of malware application is this?
When a program is secretly tracking the system's setting without user consent, what type of malware application is this?
What type of application floods users with online services when browsing the internet?
What type of application floods users with online services when browsing the internet?
Which of the is an inherent indicator of potential Adware?
Which of the is an inherent indicator of potential Adware?
How do attackers use keystroke loggers?
How do attackers use keystroke loggers?
Which reason explains how risk to security occur?
Which reason explains how risk to security occur?
An entity decides not to use IDS or Firewall. What kind of design can result for the entity?
An entity decides not to use IDS or Firewall. What kind of design can result for the entity?
When there is a failure to apply fixes that target bugs. What technological aspect is being addressed?
When there is a failure to apply fixes that target bugs. What technological aspect is being addressed?
A technician uses simple passwords that can easily be cracked. How those act as a risk?
A technician uses simple passwords that can easily be cracked. How those act as a risk?
What vulnerability is created when there are systems and servers made available, but without proper documentation?
What vulnerability is created when there are systems and servers made available, but without proper documentation?
What is the security risk when there are older versions involved in technology?
What is the security risk when there are older versions involved in technology?
When there are outdated keys connected to a key management system, what attack can this be?
When there are outdated keys connected to a key management system, what attack can this be?
Company A has outsourced its data in the cloud without the proper documentation. What type of risk is this?
Company A has outsourced its data in the cloud without the proper documentation. What type of risk is this?
What is the implication when there is a system sprawl in place.
What is the implication when there is a system sprawl in place.
Which impact refers to potential theft of the personal or financial information?
Which impact refers to potential theft of the personal or financial information?
Which impact refers to attackers preventing users from accessing websites and resources?
Which impact refers to attackers preventing users from accessing websites and resources?
How is that systems lose revenue?
How is that systems lose revenue?
When there is a breach what causes an entity to be required to sanctions and fines?
When there is a breach what causes an entity to be required to sanctions and fines?
Which of the following scenarios exemplifies an intentional threat originating from within an organization?
Which of the following scenarios exemplifies an intentional threat originating from within an organization?
How are 'structured external threats' distinguished from 'unstructured external threats'?
How are 'structured external threats' distinguished from 'unstructured external threats'?
What is the primary motivation behind state-sponsored hackers targeting another country's information systems?
What is the primary motivation behind state-sponsored hackers targeting another country's information systems?
What characteristic differentiates a 'black hat' hacker from a 'gray hat' hacker?
What characteristic differentiates a 'black hat' hacker from a 'gray hat' hacker?
How does a 'drive-by download' compromise a user's system?
How does a 'drive-by download' compromise a user's system?
Which of the following best describes the function of an 'obfuscator' in malware?
Which of the following best describes the function of an 'obfuscator' in malware?
An employee downloads a program that, along with its stated functionality, secretly installs a keylogger. What type of malware is this application considered?
An employee downloads a program that, along with its stated functionality, secretly installs a keylogger. What type of malware is this application considered?
A user notices their computer screen intermittently blinking, inverting colors, and displaying everything backward. Which type of malware infection is suggested by these indicators?
A user notices their computer screen intermittently blinking, inverting colors, and displaying everything backward. Which type of malware infection is suggested by these indicators?
A company's security team discovers an application on an employee's computer connecting to a remote server and logging keystrokes. What type of malware is most likely present?
A company's security team discovers an application on an employee's computer connecting to a remote server and logging keystrokes. What type of malware is most likely present?
What is the key difference between a virus and a worm in terms of propagation?
What is the key difference between a virus and a worm in terms of propagation?
An attacker has successfully created a botnet. How would an attacker leverage this network of infected computers?
An attacker has successfully created a botnet. How would an attacker leverage this network of infected computers?
Which of the following is a primary characteristic that makes fileless malware difficult to detect?
Which of the following is a primary characteristic that makes fileless malware difficult to detect?
A user is experiencing frequent pop-up ads, redirections to unfamiliar websites, and a new toolbar in their browser that they did not install. What might cause this activity?
A user is experiencing frequent pop-up ads, redirections to unfamiliar websites, and a new toolbar in their browser that they did not install. What might cause this activity?
Your computer has been infected with a program displaying unsolicited sales and pop-ups. What type of PUA is it?
Your computer has been infected with a program displaying unsolicited sales and pop-ups. What type of PUA is it?
Which of the following best describes a 'zero-day vulnerability'?
Which of the following best describes a 'zero-day vulnerability'?
Why does failing to change default settings on network devices create a vulnerability?
Why does failing to change default settings on network devices create a vulnerability?
An organization neglects to document new systems and server connections. Which kind of vulnerability is likely to arise?
An organization neglects to document new systems and server connections. Which kind of vulnerability is likely to arise?
Leaked database credentials have led to external exploitation of the database. Classify the issue.
Leaked database credentials have led to external exploitation of the database. Classify the issue.
What is the primary risk associated with using unsupported legacy platforms within an organization's infrastructure?
What is the primary risk associated with using unsupported legacy platforms within an organization's infrastructure?
Why should private keys used with certificates always be stored in a highly secured environment?
Why should private keys used with certificates always be stored in a highly secured environment?
Flashcards
What is a Threat?
What is a Threat?
A potential occurrence of an undesirable event that can eventually cause damage or disrupt operations.
Examples of Threats
Examples of Threats
Stealing sensitive data, causing server shutdowns, tricking employees, or infecting systems with malware.
Natural Threats
Natural Threats
Threats from natural events like fires and floods.
Unintentional Threats
Unintentional Threats
Signup and view all the flashcards
Intentional Threats
Intentional Threats
Signup and view all the flashcards
Black Hats
Black Hats
Signup and view all the flashcards
White Hats
White Hats
Signup and view all the flashcards
Gray Hats
Gray Hats
Signup and view all the flashcards
Suicide Hackers
Suicide Hackers
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Cyber Terrorists
Cyber Terrorists
Signup and view all the flashcards
State-Sponsored Hackers
State-Sponsored Hackers
Signup and view all the flashcards
Hacktivist
Hacktivist
Signup and view all the flashcards
Hacker Teams
Hacker Teams
Signup and view all the flashcards
Industrial Spies
Industrial Spies
Signup and view all the flashcards
Insider
Insider
Signup and view all the flashcards
Criminal Syndicates
Criminal Syndicates
Signup and view all the flashcards
Organized Hackers
Organized Hackers
Signup and view all the flashcards
Threat Vector
Threat Vector
Signup and view all the flashcards
Direct access
Direct access
Signup and view all the flashcards
Removable media
Removable media
Signup and view all the flashcards
Wireless
Wireless
Signup and view all the flashcards
Email
Signup and view all the flashcards
Cloud
Cloud
Signup and view all the flashcards
Ransomware/malware
Ransomware/malware
Signup and view all the flashcards
Supply chain
Supply chain
Signup and view all the flashcards
Business partners
Business partners
Signup and view all the flashcards
What is Malware?
What is Malware?
Signup and view all the flashcards
Malware System Entry
Malware System Entry
Signup and view all the flashcards
Crypter
Crypter
Signup and view all the flashcards
Downloader
Downloader
Signup and view all the flashcards
Dropper
Dropper
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Injector
Injector
Signup and view all the flashcards
Obfuscator
Obfuscator
Signup and view all the flashcards
Packer
Packer
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Malicious Code
Malicious Code
Signup and view all the flashcards
What is a Trojan?
What is a Trojan?
Signup and view all the flashcards
Remote Access Trojans
Remote Access Trojans
Signup and view all the flashcards
Backdoor Trojans
Backdoor Trojans
Signup and view all the flashcards
Botnet Trojans
Botnet Trojans
Signup and view all the flashcards
Rootkit Trojans
Rootkit Trojans
Signup and view all the flashcards
E-banking Trojans
E-banking Trojans
Signup and view all the flashcards
Point-of-Sale Trojans
Point-of-Sale Trojans
Signup and view all the flashcards
Defacement Trojans
Defacement Trojans
Signup and view all the flashcards
Service Protocol Trojans
Service Protocol Trojans
Signup and view all the flashcards
Mobile Trojans
Mobile Trojans
Signup and view all the flashcards
Security Software D
Security Software D
Signup and view all the flashcards
What is a Virus?
What is a Virus?
Signup and view all the flashcards
Virus Characteristic
Virus Characteristic
Signup and view all the flashcards
Study Notes
Threats
- A threat refers to something that can cause damage and disrupt operational activities of an organization.
- Attackers use threats to infiltrate and steal data, such as personal info, financial info, and login credentials.
Examples of Threats
- An attacker stealing sensitive data.
- An attacker causing a server to shut down.
- An attacker tricking an employee into revealing sensitive information.
- An attacker infecting a system with malware.
- An attacker spoofing the identity of an authorized person to gain access.
- An attacker modifying or tampering with data transferred over a network.
- An attacker remotely altering data in a database server.
- An attacker performing URL redirection or forwarding.
- An attacker performing privilege escalation for unauthorized access.
- An attacker executing a denial-of-service (DoS) attack for making resources unavailable.
- An attacker eavesdropping on a communication channel without authorization.
Threat Sources
- Threats can be classified into natural, unintentional, and intentional
- Natural threats include fires, floods and power failures and have the potential to cause physical damage to computer systems
- Unintentional threats originate from insider security breaches, negligence, operator errors, unskilled administrators, or untrained employees
- Intentional threats include insiders or internal attacks performed by disgruntled or negligent employees that intentionally/unintentionally harm the organization.
- Most computer and internet related crimes are internal attacks performed by individuals within the organization
- External attacks exploit vulnerabilities already present in a network, and the potential severity is dependent on identified network weaknesses
- Structured external threats are implemented by technically skilled attackers who use tools to gain access into a network with the intention of disrupting services
- The motivation behind structured attacks can vary but includes criminal bribes, racism, politics, and terrorism
- Structured external threats include examples like distributed ICMP floods, spoofing and simultaneously executing attacks from multiple sources
- Unstructured external threats are performed by unskilled attackers, aspiring hackers, and are typically based on curiosity rather than criminal intent.
- Unstructured external attacks can be easily prevented with port scanning and address sweeping security solutions
- An example is using freely available online tools to attack a network or crash a website
Threat Actors/Agents
- Black hats use their extraordinary computing skills for illegal/malicious purposes, often engaging in criminal activities, and are also know as crackers.
- White hats (penetration testers) use their hacking skills for defensive purposes with permission from the system owner, such as security analysts knowledgeable about countermeasures.
- Gray hats work both offensively and defensively at various times, helping hackers find vulnerabilities while assisting vendors to improve products (software/hardware).
- Suicide hackers aim to bring down critical infrastructure for a cause and are unconcerned about facing jail terms or other punishment.
- Script kiddies are unskilled hackers using scripts, tools, and software developed by real hackers, focusing on the quantity of attacks instead of quality.
- Cyber terrorists with religious or political motivations aim to create fear through large-scale disruption of computer networks
- State-sponsored hackers, employed by governments, seek to penetrate systems, gain top-secret information, and damage other governments.
- Industrial spies perform corporate espionage to steal critical information like blueprints and formulas, often using advanced persistent threats (APTs) and social engineering.
- Insiders are employees (trusted persons) with critical asset access who use their privileges to violate rules or harm the organization's systems, often due to disgruntled or terminated status.
- Hacker teams are skilled hackers with resources and funding working together to research state-of-the-art technologies
- Criminal Syndicates are part of organized and prolonged criminal activities that exploit victims from distinct jurisdictions' to embezzle money through cyber attacks.
- Hackivists hack into government or corporate computer systems as a form of activism.
- Organized hackers are groups of hackers that work together in criminal activities that sell the information to the highest bidder.
Attributes of Threat Actors
- Internal actors are trusted insiders with authorized access to resources.
- External actors are outsiders with no authorized access but physical resources.
- Highly sophisticated threat actors are more successful than less sophisticated ones.
- Resources/funding determines how a threat actor supports an attack financially or with tools.
- Intent/motivation of threat actors can be connected to political/personal goals, making them more likely to launch an attack.
Threat Vectors
- Direct access is where the attacker gains physical access to the target system and performs malicious activities.
- Removable Media is where devices such as USB drives, phones, and printers become a way for malware to run automatically on the system.
- Wireless is where corporate devices can be comprised through unsecured wirless hotspots and/or credentials being stolen.
- Email sends phishing attacks containing malicious attachments that allow attackers to compromise their targets.
- Cloud contains injected malware into cloud resources to gain access to user information.
- Ransomware/Malware takes advantage of unpatched vulnerabilities as well as malware to infiltrate an organization.
- Supply chain attempts to compromise the target by exploiting vulnerabilities in the resources supplies by 3rd party vendors
- Business partners are third-party organizations that emerge as a threat vector.
Autorun.inf Mitigation
- Autorun.inf is a file that when executed, runs executables listed in the file and displays the file.
- To mitigate the autorun.inf threat, the Autostart functionality should be turned off.
Common Malware Distribution Techniques
- Black hat SEO ranks malware highly in search results.
- Social Engineered Click-jacking tricks users into clicking on innocent looking webpages.
- Spear-phishing mimics legitimate institutions in an attempt to steal login credentials.
- Malvertising embeds malware in ad networks to displays across hundreds of legitimate, high-traffic sites
- Compromised legitimate websites host embedded malware that spreads to unsuspecting visitors.
- Drive-by-downloads uses browser flaws to install malware just by visiting a webpage.
- Spam emails attaches the malware to emails and tricks victims to click the attachment.
General Malware Components
- Crypters conceal the existence of malware.
- Downloaders used by trojans download malicious code
- Droppers are covert carriers to embed malware files in order to perform an installation task
- Exploits contain commands to take advantage of bugs/vulnerabilities, breaking security through software vulnerabilities. Local (inside network) and remote (outside network) exploits
- Injectors inject malicious code into code into vulnerable running processes and changes methods
- Obfuscators conceals malicious code via various techniques for difficulty.
- Packers compress the malware file by compressing into unreadable format.
- Payloads perform the desired activity once activated that may modify or delete files, open ports etc.
- Malicious code defines the basic functionality of malware. Can take various forms Java Applets, ActiveX Controls, Browser Plug-ins and Pushed Content
Trojan Indications
- The DVD ROM drawer opens and closes automatically.
- The compute screen blinking, flips upside down, or is inverted so that everything is displayed backward.
- Printers automatically start printing documents
- A web page suddenly opening without input from the user
- The color settings of the operating system changes automatically.
- Screensavers convert to a personal scrolling message/advertisements.
- The sound volume suddenly fluctuates
- Date and time of the computer changes.
- Mouse courser moves by itself.
- The left-and right-click functions of the mouse are interchanged.
- The mouse pointer disappears compeltely.
- The mouse pointer automatically clicks on icons and is uncontrollable.
- The Windows start button disappears.
- Pop-ups with bizarre messages appear unexpectedly.
- Clipboard images/text appearing to be manipulated.
- The keyboard and mouse freeze.
- Contacts receive emails that the user did not send.
- Strange warnings or question boxes appear.
- System turns off and restarts in unusual way.
- The taskbar disappears automatically due to a Trojan.
- The Task manager is disabled by a Trojan.
- Antivirus programs are automatically disabled and corrupted/altered/deleted from the systems data.
Types of Trojans
- Remote Access Trojans (RATs) give attackers full control of the victim's system to remotely access files and private conversations.
- Backdoor Trojans are programs that bypass standard authentication mechanisms to leverage backdoor programs in order to access the victim's computer without detection, as it is performed without the user's knowledge.
- Botnet Trojans are leveraged to infect a large amount of computers to create bot herders that can command said botnets to be used for attacks on targets.
- Rootkit Trojans are designed to get admin level access to a system that's difficult to detect by observing services, system task lists, or registries.
- E-banking trojans intercept account information before the system an encrypt it and send it to the attack command-and-control.
Trojan Uses
- Deeting critical operating system files.
- Disabling firewalls and antivirus.
- Create backdoors to gain remote access
- Use a victim's pc for spamming.
- Steal personal information such as security codes and passwords.
- Download spyware, adware, malware.
- Encrypt and lock out victims from accessing the system.
Types of Viruses
- System or Boot Sector infects system sectors including the master boot record (MBR) and the DOS boot record system sectors
- Email attachments and removable media (USB drives) are the primary carriers
- File Viruses infect files executed or interpreted in the system, such as COM, EXE, SYS, OVL, OBJ, PRG, MNU, and BAT files
- inserts their code into the original file and infect executable files
- Multipartite Virus (hybrid virus) combines the approach of file infectors and boot record infectors, simultaneously attacking both the boot sector and the executable or program files.
- Macro viruses infect Microsoft Word and similar applications, written in the macro language Visual Basic
- Cluster clusters infect files without changing the file or planting additional files
- Stealth/Tunneling alter and corrupts corrupting services to hide from anti-virus programs
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.