Malware
Analyze indicators of compromise and determine the type of malware.
Last updated
Was this helpful?
Analyze indicators of compromise and determine the type of malware.
Last updated
Was this helpful?
Viruses are malware that require human-interaction to propagate.
Worms are malware that do NOT require human-interaction to propagate.
Crypto-malware encrypts data to make it unavailable.
Ransomware is a form of Crypto-Malware and requires payment for the keys that can recover data encrypted by the attacker.
Trojans are malicious software hidden inside of benign software.
Rootkits are collections of tools designed to gain and/or maintain administrator access.
Keyloggers, well, logs keystrokes. The point of them are to primarily learn user credentials, but can also be used to spy on people.
Adware can be described as enticing pop-ups loaded with malware. Examples are found on adult websites. If a website is promising you a good time, think twice.
Spyware collects information about your computer activity. For example, logon times, files accessed, etc. might help an attacker learn more about you and/or your organization.
Computers under the control of an attacker.
Logic Bombs are malware that executes when specific conditions are met. Said conditions may include date, time, or resource usage. Logic Bombs are often associated with insider threats.
Backdoors are entry points left behind by the attacker so she can maintain access in the future.