Start
Malware Types,
Advanced Persistent Threats,
Zero Day Attacks
This material was developed with funding from the
National Science Foundation under Grant # DUE 1601612
1/8
Back
Malware Types, Advanced Persistent Threats, Zero Day Attacks
Next
Restart
Introduction
Malware (malicious code) is software that has been created for malicious or nefarious purposes. Malicious code can be installed in many devious ways that can be easy to miss by authorized users.
Zero Day Attacks
Logic Bombs
Remote Access Trojan
(RAT)
Viruses
Worms
Conclusion
Keylogger
Spyware
Advanced Persistent
Threats (APTs)
Trojans
Rootkits
Quiz
Bots & Botnets
Adware
Viruses are malicious pieces of code that attach themselves to a piece of executable code or host application. It executes when the host application is executed. It replicates itself by finding other applications to infect. The virus, also, delivers its payload which can damage and delete files, rebooting issues, etc.
Worms are malicious pieces of code that attack the network and computer systems. It doesn’t need assistance to self-replicate or travel through a network.
Download Now
Trojans are a deceptive piece of software that hide their malicious intent. Trojans can be disguised as games or special utility to entice the authorized user to copy and install it onto the system. Once they are on the system, the Trojan accomplishes its hidden purpose. The authorized user throughout remains unaware of the true purpose.
Trojans are named after the horse from the Trojan War. In the war, the Achaeans wanted to takeover the city of Troy, however, they couldn’t crush they city’s defenses for years. Thus, they built a wooden horse to gift the people of Troy to deceive them. Allowing the soldiers to open the city gates and takeover the entire city in a day.
Remote Access Trojans (RATs) are malware that allow control of a user’s computer from a remote location. RATs are usually attached to files that appear legitimate (phishing emails). After installation, the attacker is free to access the compromised computer whenever.
Remote Access Trojan
(RAT)
Logic bombs is malicious software or a code that remains dormant until an event causes it to release its payload. They are intentionally installed by, usually, an authorized user.
An attempt to capture and store the user’s keystroke during a session. The captured keystrokes are then stored onto a file for later access by the attacker.
Spyware is software that monitors or spies on user’s activity without their knowledge. It is installed without the user’s knowledge or consent. Spyware can record keystrokes, steal information, etc.
sneakers
Adware is a type of malware that shows unwanted advertisements to user in the form of pop-ups.
SEARCH
Bots comes from “robot” are software applications or computer program used to execute tasks automatically. Malicious bots allow an an attacker of remote takeover of a user’s system.
Botnets are many inter-connected computer or devices that contain multiple running malicious bots.
A Rootkit is a collection of software programs that provide administrative access to a user’s system while hiding its presence on the user’s system.
APT attacks hope to remain on computer systems for long period of time undetected. These attacks require sophisticated hacking techniques, time, and effort. They are usually carried out by a group of hackers that are highly organized and well-resourced. Hackers mostly target nation-states and corporations to gain intelligence on them. They create backdoors on the system to return in future. Example the DNC Email Hack (2016) The attack pattern:Develop a strategy: what is it they want to achieveGain entry into the systemAfter entry, for hackers to maintain an ongoing presence they create backdoors or rewrite code to remain undetectedExplore the network and gain administrator privilegeStage attack to accomplish goal and maintain ongoing presence
Advanced Persistent
Threats (APTs)
Zero Day Attacks
?
Zero Day Attacks is an unknown flaw in either the hardware or software of a system that leaves the system vulnerable to a cyberattack.
Social Engineering
How to Mitigate Attacks
Tailgating
Spear Fishing/Whaling
Shoulder Surfing
Dumpster Diving
Baiting
Social Engineering Attacks
On the Rise
Phishing
Pretexting
Scareware
Ransomware
b. Worms
Quiz 1 0f 5
Mary leaves her workstation to use the restroom. While, Mary is in the restroom Bob decides to plug in his USB to record and store Mary’s keystrokes to use later.
a. Logic Bombs
d. Keylogging
Choose the correct malware type for each scenario.
c. Advanced Persistent Threats
d. Logic Bomb
Quiz 2 0f 5
A high-ranking government official fell for a phishing email created by an official criminal organization that published all official documents collected over the last two years
c. Keylogging
a. Remote Access Trojan
b. Advanced Persistent Threats
d. Adware
a. Trojans
Quiz 3 0f 5
Bob, an employee, of Cat & Co receives malicious email from an attacker. However, the attacker carefully curated the email to appear it is from his boss. The email includes downloadable attachment infect with malware.
d. Logic Bombs
a. Advanced Persistent Threats
Quiz 4 0f 5
John was caught embezzling funds from his organization causing him to lose his job. However, still angry from being fired he decides to install a malicious pieces of software on all the computers to be released on his birthday 4/11/2021
d. Trojans
b. Advanced Persistent Threats
a. Adware
c. Worms
Quiz 5 0f 5
Mary created a malicious piece of software in order to attack the company’s network and computer system without any assistance.