WannaCry Ransomware Attack 2017
22 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an advanced persistent threat (APT) characterized by?

  • Using a wide variety of intrusion technologies and malware against specific targets over an extended period (correct)
  • Focusing on disrupting commercial websites
  • Randomly targeting individuals
  • Releasing malware in the wild to see what sticks
  • What is the primary purpose of a downloader?

  • To install other malicious software on a compromised system (correct)
  • To create a backdoor in a system
  • To launch a denial-of-service attack
  • To remove malware from a system
  • What is the term for a set of tools used to generate new malware automatically?

  • Exploit Builder
  • Vulnerability Scanner
  • Attack Kit (correct)
  • Malware Factory
  • What is a type of malware that displays unwanted advertisements?

    <p>Adware</p> Signup and view all the answers

    What is the term for a mechanism that bypasses normal security checks, allowing unauthorized access?

    <p>Backdoor</p> Signup and view all the answers

    What is a type of attack that uses code on a compromised website to exploit a browser vulnerability?

    <p>Drive-by download</p> Signup and view all the answers

    What is a primary reason why worms are ideal for spreading malicious payloads?

    <p>Because they can rapidly compromise a large number of systems</p> Signup and view all the answers

    What technique do worms use to evade detection and skip past filters?

    <p>Polymorphic technique</p> Signup and view all the answers

    What is a characteristic of metamorphic worms?

    <p>They change their appearance</p> Signup and view all the answers

    What is a zero-day exploit?

    <p>An unknown vulnerability that is only discovered by the general network community when the worm is launched</p> Signup and view all the answers

    How many zero-day exploits were discovered and exploited in 2015?

    <p>54</p> Signup and view all the answers

    What is a primary goal of worm developers when spreading a worm?

    <p>To maximize the spread of the worm</p> Signup and view all the answers

    Which type of malware is characterized by its ability to spread from system to system without the need for human interaction?

    <p>Worm</p> Signup and view all the answers

    What is the primary goal of an Advanced Persistent Threat (APT)?

    <p>Theft of sensitive information</p> Signup and view all the answers

    What is the term for malware that is designed to target a specific individual or organization?

    <p>Targeted malware</p> Signup and view all the answers

    What is the term for the process of identifying potential targets for a malware attack?

    <p>Target selection</p> Signup and view all the answers

    What is the term for the process of assessing the potential impact of a malware attack?

    <p>Threat assessment</p> Signup and view all the answers

    What is the term for malware that is designed to remain undetected on a system?

    <p>Stealth malware</p> Signup and view all the answers

    What is the term for the process of analyzing malware in a controlled environment?

    <p>Sandbox analysis</p> Signup and view all the answers

    What is the term for the process of detecting and blocking malicious traffic at the network perimeter?

    <p>Perimeter scanning</p> Signup and view all the answers

    What is the term for the process of identifying and mitigating vulnerabilities in software and systems?

    <p>Vulnerability management</p> Signup and view all the answers

    What is the term for the process of responding to and managing a malware outbreak?

    <p>Incident response</p> Signup and view all the answers

    Study Notes

    Malware Definition and Concepts

    • Malware is software inserted covertly into a system to compromise data confidentiality, integrity, or availability.
    • Advanced Persistent Threat (APT): Long-term cybercrime aimed at business and political targets, often state-sponsored.
    • Adware: Software integrated with advertising, causing pop-ups or browser redirection.

    Types of Malware

    • Trojan Horse: Malicious software that misleads users about its true intent.
    • Backdoor (Trapdoor): Unauthorized mechanism bypassing normal security to access a system.
    • Downloader: Code that installs other malware on an already compromised machine.
    • Worms: Self-replicating malware that spreads through vulnerabilities, often evading detection methods via polymorphic behavior.

    Notable Malware Examples

    • WannaCry Ransomware: Spread rapidly in May 2017, encrypting files and demanding Bitcoin ransom. Compromised systems included personal computers and servers across 150 countries.
    • Mobile Phone Worms: First discovered via Cabir in 2004. Can disable phones, delete data, and send costly messages.

    Malware Propagation Techniques

    • Drive-by Download: Exploits browser vulnerabilities for automatic malware installation without user consent.
    • Social Engineering: Users are tricked into compromising their own systems.
    • Spam: Bulk unsolicited emails often containing malware links or phishing attempts.

    Information Theft Mechanisms

    • Keyloggers: Capture keystrokes to monitor sensitive data, targeting keywords like passwords.
    • Spyware: Monitors and reports user activity, including redirecting web traffic to fake sites.

    Phishing Techniques

    • Phishing: User trust exploited via deceptive emails that mimic legitimate sources to collect sensitive information.
    • Spear Phishing: Personalized attacks targeting specific individuals with researched data.

    Malware Countermeasures

    • Prevention Strategies: Implementation of policy, awareness, and vulnerability management.
    • Detection Techniques: Utilization of host-based behavior-blocking software to monitor and block malicious actions in real time.
    • Sandbox Analysis: Allows potentially harmful code to run in a controlled environment to observe behavior without risk to the real system.

    Monitoring Approaches

    • Ingress Monitors: Analyze incoming traffic for malicious activities, focusing on unused IP addresses.
    • Egress Monitors: Survey outgoing traffic for signs of suspicious behavior.

    Summary of Malware Types

    • Classification includes attack kits, advanced persistent threats, and various forms of malware like backdoors and worms.
    • Malware can have damaging payloads such as data corruption, ransomware, and identity theft tactics.

    Other Considerations

    • The malware landscape continues to evolve with the emergence of zero-day exploits and increasingly sophisticated propagation techniques.
    • Understanding malicious code and its countermeasures is crucial for maintaining cybersecurity.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz will test your knowledge of the WannaCry ransomware attack that occurred in May 2017. Learn about the impact of the attack, how it worked, and how to recover from it.

    More Like This

    Use Quizgecko on...
    Browser
    Browser