Module 1.2 – Given a scenario, analyse potential indicators to determine the type of attack.
| Malware | A blanker term for software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. |
| Virus | Software that can reproduce itself |
| Programme Virus | Virus which is bundled with an application |
| Boot Sector Virus | Virus that installs in the boot sector so it executes with the OS |
| Script Virus | Script based virus which runs as an OS script or a Macros |
| Fileless Virus | Virus which doesn’t install or save as a file and instead operates in the memory |
| Worm | Malware which utilises exploits to self-replicate |
| Ransomware | Malware which holds a system captive until a ransom is paid |
| Crypto-Malware | Ransomware but uses cryptography to encrypt files. The decryption key is provided once the ransom is paid. |
| Trojan Horse | Software which injects by convincing the user and anti-viruses that its something else |
| PUP | Potentially Unwanted Programme |
| RAT | Remote Administration Tool – provides the attacker administrative rights to the device |
| Rootkit | Malware which modifies kernel |
| Adware | Malware which shows adverts |
| Spyware | Malware which spys on you (e.g. keyloggers, browser monitoring) |
| Bot | Infected host which reports to a C&C for instructions |
| Botnet | Large collection of bots which executes instructions provided by C&C. |
| Logic Bomb | Malware which only executes once a logical condition is met |
| Time Bomb | Type of Logic Bomb which executes once a certain date or time is met |
| Tripwire | Monitoring system which monitors and alters if certain changes are madePlai |
| Plaintext Password | Un-encrypted password (plain text) |
| Hashing | A method of password protection where via an algorithm a password is represented as a fixed-length string of text |
| Spraying Attack | When attacker uses common passwords to attempt password to an account then moves from to avoid account lockout |
| Brute Force Attack | Attack attempting every single password combination until a match is made. |
| Online Brute Force | Brute force to log into a website using every combination |
| Offline Brute Force | Brute force to log in but compares against stolen hashes |
| Dictionary Attack | Access access attack using a dictionary of common words |
| Rainbow Table Attack | Pre-built optimised set of hashes |
| Salting | A bit of random additional data added to a password before hashing. |
| Malicious USB Cable | USB cable with additional electronics that is identified by Windows as a HID. Can perform inputs as a HID. |
| Malicious flash drive | Flash Drive with additional electronics that is identified by Windows as a HID. Can perform inputs as a HID and often holds hidden files which are executed. |
| Skimming | Stealing credit card information during a normal transaction |
| Card Cloning | Cloning a card with magnetic stripe |
| Poisoned AI | Artificial intelligence which has been poisoned with bad input (e.g. twitter training AI) |
| Evasion attack | Evading AI by knowing and therefore predicting it’s behaviours |
| Supply Chain Attack | Attack which originates from the supply chain |
| Cryptographic Attack | Decrypting encrypted data |
| Birthday Attack | Allows Brute Force if hash collision is found |
| Hash Collision | When two different plaintext passwords equal the same hash |
| Downgrade Attack | – Most computers agree an encryption method when communicating – Downgrade attack happens when the victim system is forced to downgrade security |
| What are the 9 types of Malware? | 1. Virus 2. Crypto-Malware 3. Ransomware |
| Difference between Virus and Worm | Viruses use a programme to execute where a Virus exploits vulnerabilities |
| What’s a key characteristic of a Worm? | Spreads very fast |
| What are the two common types of Data? | 1. Personal Data 2. Organisational Data |
| How do you protect against ransomware? (4) | 1. Backups 2. Keep OS up to date 3. Keep Anti-virus up to date 4. Keep apps up to date |
| What type of malware is installed via Trojan Horse? | 1. Potentially Unwanted Programme (PUP) 2. Backdoor 3. RAT |
| What can a RAT do? | As it has administrative privileges pretty much anything |
| What is the key advantage of a rootkit? | Very difficult to detect |
| How can you prevent and remove rootkits? | 1. Look for unusual anti-malware results 2. Remover tool specific for rootkits 3. Secure boot with UEFI to secure BIOS |
| What are the two common ways adware is installed? | 1. Packaged with other downloads 2. Funnily enough with adware removers |
| How do you protect against adware/spyware? | 1. Maintain anti-virus definitions 2. Backups 3. Always know what your installing 4. Anti-malware removal tools |
| What can botnets do? | 1. DDoS 2. Replay Spam 3. Proxy Traffic |
| Why are Logic bombs difficult to deal with? | 1. Difficult to identify pre-activation 2. Difficult to recover from once activated |
| Who is usually responsible for deploying a logic bomb? | Disgruntled employee |
| What usually happens to a logic bomb post activation? | It deletes itself |
| How can you secure passwords? | Hashing |
| What is the key advantage of hashing? | Cannot be reversed |
| Why do you salt passwords? | To protect against has comparison attacks (e.g. rainbow table) |
| How can you protect against supplier attacks? | 1. Use reputable companies 2. Maintain small supplier base 3. Strict controls over policies/procedures |
