SecuritySection6
SecuritySection6
Malicious software designed to infiltrate computer systems and potentially damage them without
user consent.
● Categories:
○ Viruses
○ Worms
○ Trojans
○ Ransomware
○ Spyware
○ Rootkits
○ Spam
● Account lockouts
● Concurrent session utilization
● Blocked content
● Impossible travel
● Resource consumption
● Inaccessibility
● Out-of-cycle logging
● Missing logs
● Documented attacks
Viruses
Computer Virus: Made up of malicious code that's run on a machine without the user's
knowledge, infecting the computer whenever it's run.
Worms
Worm: Malicious software that can replicate itself without user interaction, spreading throughout
a network.
Trojans
Trojan: Disguised as harmless software, it performs malicious activities when executed.
● Remote Access Trojan (RAT): Provides remote control of victim machines, commonly
used for data exfiltration and maintaining persistence.
Ransomware
Ransomware: Blocks access to computer systems or data by encrypting it until a ransom is
paid.
Protection Measures
● Regular backups
● Software updates
● Security awareness training
● Multi-Factor Authentication (MFA)
Actions if Affected
● Never pay the ransom.
● Disconnect infected machines from the network.
● Notify authorities.
● Restore data and systems from known good backups.
Rootkits
Rootkit: Designed to gain administrative-level control over a given computer system without
being detected.
● The account with the highest level of permissions is called the Administrator account.
○ Allows the person to install programs, delete programs, open ports, shut ports,
and do whatever they want on that system.
● A computer system has several different rings of permissions throughout the system.
○ Ring 3 (Outermost Ring): Where user level permissions are used.
○ Ring 0 (Innermost or Highest Permission Levels): Operating in Ring 0 is called
“kernel mode”, allows control over device drivers, sound card, video display, etc.
● When a rootkit is installed on a system, it tries to move from Ring 1 to Ring 0 to hide
from other functions of the operating system to avoid detection.
● One technique used by rootkits to gain deeper access is DLL injection.
○ DLL Injection: Technique used to run arbitrary code within the address space of
another process by forcing it to load a dynamic-link library.
○ Dynamic Link Library (DLL): Collection of code and data used by multiple
programs simultaneously for code reuse and modularization.
● Shim: A piece of software code placed between two components to intercept and
redirect calls between them.
○ Rootkits are powerful and difficult to detect because the operating system is
essentially blinded to them.
○ To detect them, boot from an external device and scan the internal hard drive
using a good anti-malware scanning solution from a live boot Linux distribution.
● Remote Access Trojan (RAT): Acts like a backdoor in modern networks, placed by threat
actors to maintain persistent access to a system.
● Easter egg: Hidden feature or novelty within a program, often inserted by developers as
an inside joke, but may contain significant vulnerabilities.
Logic Bombs
Malicious code inserted into a program, which executes only when certain conditions are met.
Keylogger
Keylogger: Software or hardware that records every keystroke made on a computer or mobile
device.
Protection Measures
● Regular updates and patches.
● Quality antivirus and antimalware solutions.
● Phishing awareness training.
● Multi-factor authentication.
● Encryption of keystrokes.
● Physical checks of desktops, laptops, and servers.
● Installed through various methods such as bundling with other software or deceptive
pop-up ads.
● Protection: Use reputable antivirus and anti-spyware tools regularly updated.
Bloatware
Pre-installed software on new computers or smartphones that users did not request or need.
● Can waste storage space, slow down performance, and introduce security
vulnerabilities.
● Removal methods: Manual removal, bloatware removal tools, or clean OS installation.
● Some malware focuses on infecting system memory to leverage remote procedure calls
over the network.
● Modern malware often uses fileless techniques to avoid detection.
○ Stage 1 Dropper or Downloader: Lightweight shellcode executed on a system to
retrieve additional portions of malware code.
■ Dropper: Initiates or runs other malware forms within a payload.
■ Downloader: Retrieves additional tools post-initial infection.
■ Shellcode: Lightweight code meant to execute an exploit on a target.
● Stage 2: Downloader: Installs remote access Trojan for command and control on the
victimized system.
● Actions on Objectives: Execute primary objectives like data exfiltration or file encryption.
● Concealment: Helps threat actors prolong unauthorized access by hiding tracks and
erasing log files.
● “Living off the Land”: Exploits standard tools for intrusions.