Threats
Malware
Malicious software designed to harm or exploit systems. Some examples are viruses, worms, trojans.
For more information, please see Malware
Virus
A virus requires user interaction, such as opening an infected file or running a malicious program, to spread. They require a "host" application that they embed themselves in and they cannot replicate on their own. Some common types of viruses:
-
Master Boot Record Viruses
- Infects the master boot record (MBR) of a hard drive, making them particularly dangerous.
- Stored in the first sector of the hard drive and loaded into memory during boot-up.
- Infects the MBR and spreads when the system boots from an infected disk.
- Hard to detect because they're installed before the operating system boots.
-
Macro Viruses
- Exploit document-embedded code.
- Often found in word processing and spreadsheet applications.
- Infects when files with macros are opened.
- Macros are not malicious by default; they're designed to automate functions in documents.
-
File Infector Viruses
- Infects executable files (.exe, .com, .dll, etc.).
- Spreads when infected programs are launched or accessed.
- Can overwrite, corrupt, or modify files, leading to system damage or data loss.
-
Service Injection Viruses
- Injects itself into legitimate system processes, like those that run in the background.
- Avoids detection by antivirus tools by blending with normal system activity.
- Can persist through reboots and continue spreading without being easily identified.
-
Multipartite Viruses
- Uses more than one propagation technique.
- Combines boot sector and file infections.
- Spreads every time the computer boots or a specific program runs.
- Mitigation: Run comprehensive antivirus scans that check both boot sectors and files.
-
Encrypted Viruses
- Encrypt themselves to avoid detection.
- Malware is scrambled into unreadable cipher text.
- Mitigation: Employ security tools that focus on encrypted threats.
-
Polymorphic Viruses
- Encrypts itself and alters its decryption module each time it infects a new system.
- Continuously changes to avoid detection.
- Mitigation: Employ heuristic-based detection systems.
-
Metamorphic Viruses
- Rewrites its own code with each infection.
- Appears entirely different with each infection, making detection extremely hard.
- Mitigation: Utilize advanced heuristic and behavior-based antivirus systems.
-
Stealth Viruses
- Hides by modifying system calls and antivirus queries.
- Prevents detection by security tools.
- Mitigation: Use antivirus solutions with rootkit detection capabilities.
-
Armor Viruses
- Confuses attempts to analyze or remove the virus.
- Uses layered protections to evade security tools.
- Mitigation: Ensure frequent updates to antivirus tools.
-
Hoaxes
- A form of social engineering, not a real virus.
- Designed to trick users into spreading misinformation or purchasing unnecessary software.
- Mitigation: Educate users to verify suspicious messages or alerts.
Worm
A worm can replicate and spread automatically without user intervention.
- No "host" application needed, nor human interaction.
- Takes advantage of vulnerabilities in systems and applications.
- Dangerous, can infect computers and computing assets.
- Cause disruptions because they constantly try to replicate and spread.
- Consumes network, compute resources, power when it spread, slowing down the system.
Known examples:
- The Internet worm
- Code Red worm
- Nimda
- Stuxnet
Trojan
Trojan Horses is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function. It can also create backdoors but are only active while a specific application is running.
- Malware disguised as a piece of harmless or desirable software.
- Not as effective as a rootkit, which maintain root-level access while concealing malicious activity.
- Examples: fake antivirus, games, and utilities/productivity tools.
A RAT (Remote Access Trojan) is a widely used threat because it provides the attacker with remote control of the machine.
- Earliest version is a testris game which infected with the trojan.
- The game is installed into floppy disks and share between friends.
Mitigation:
- Use an AV or Anti-malware prior to opening or installing any program.
- Ensure your system is patched against any vulnerabilities.
Ransomware
Malware that encrypts files, demanding payment for their release.
- Blocks access to computer or its data until the ransom is paid.
- Example: WannaCry, CryptoLocker
Mitigation:
- Conduct regular backups.
- Install regular software updates.
- Provide security awareness training.
- Implementing MFA for the systems.
Zombies and Botnets
-
Botnet
- A network of compromised computers, known as zombies or bots.
- Remotely controlled by malicious actors.
- Created using other types of malwares to gain access to a system and victimize it.
- Zombies are used to perform tasks using remote commands.
-
Command and Control Node (C2 Node)
- Used for managing and coordinating the activities of the zombies.
- Can use zombies as pivot points to gain access to new victims.
- Can use a zombie to make it look like the infected computer is performing the attach.
- It can also store illegal media on the infected machines inside of the botnet.
- Commonly used to perform a DDoS attack.
Rootkits
A rootkit tries to maintain root-level access while concealing malicious activity.
- Typically creates a backdoor and attempts to remain undetected by anti-malware software.
- A rootkit remains active while the system is running.
- Digs into the OS deeply, making it difficult for AV systems to detect it.
Mitigation:
- Conduct an external system scan.
- Continuous vigilance and security measures.
DLL Injection
DLL injection is a technique used to run malicious code within another process by forcing it to load a dynamic-link library (DLL).
- Runs arbitrary code within the address space of another process.
- Forces the target process to load a specific DLL.
- DLLs are often part of the default Windows OS environment.
- Uses a shim to load the DLL automatically every time the Windows machine starts.
Shim
A shim is a small piece of software that sits between two components to alter their interaction.
- Placed between two software components.
- Intercepts calls between the components and redirects them as needed.
Backdoors and Logic Bombs
-
Backdoors
- Allow unauthorized access by bypassing regular security measures.
- Originally created for maintenance or repair purposes.
- Example: Remote Access Trojan (RAT) allows remote control of infected systems.
-
Easter Eggs
- An insecure coding practice often meant as a harmless joke or "gift" to users.
- Related to logic bombs, but typically non-malicious.
- Example: Typing "do a barrel roll" in Google's search bar triggers a visual effect.
-
Logic Bombs
- Executes harmful functions when triggered by certain events.
- Typically inserted by insiders with malicious intent, such as disgruntled employees.
- Not installed directly by malware but hidden within existing code.
Key Logger
A piece of a software or hardware that records every single keystroke made on the device.
- Originally created by system administrators to help in troubleshooting.
- Recorded key strokes are sent back to the threat actor without the user's consent.
- Can lead to identity theft, financial fraud, and corporate espionage
Mitigation:
- Perform regular updates and patches.
- Use quality AV and Anti-malware solutions.
- Conduct Phishing awareness training for end users.
- Implement MFA.
- Encrypt keystrokes being sent to the systems.
- Perform physical checks on desktops, laptops, and servers.
Spyware and Bloatware
-
Spyware
- Collects and sends data, often without the user’s knowledge.
- Can be bundled with legitimate software or downloaded from malicious websites.
- Invades privacy and can slow down system performance.
-
Bloatware
- Comes pre-installed on new computers or smartphones.
- Bundled with other software, often unwanted or unneeded by the user.
- Not harmful, but consumes resources like RAM and storage.