CompTIA Security+ (SY0-601): Malware Infections
This section describes various methods used by attackers to infiltrate systems, including threat and attack vectors, watering hole attacks, and active interception. It also covers privilege escalation, where attackers exploit system flaws to gain unauthorized access to higher-level permissions.
Threat Vector/Attack Vector
Threat Vector:
Method used by an attacker to access a victim’s machine
Attack Vector:
Method used by an attacker to gain access to a victim’s machine in order to infect it with malware
Key Terms
Threat Vector/Attack Vector
Threat Vector:
Method used by an attacker to access a victim’s machine
Attack Vector...
Watering Holes
Malware is placed on a website that you know your potential victims will access
Ex: Dio...
Active Interception
Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between th...
Privilege Escalation
Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’...
Backdoors & Logic Bombs
Backdoors are used to bypass normal security and authentication functions
Remote Access...
Symptoms of Infection
Hard drives, files, or applications are not accessible anymore
Strange noises occur
Unusual error messages
Disp...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Threat Vector/Attack Vector | Threat Vector: Attack Vector: |
Watering Holes | Malware is placed on a website that you know your potential victims will access Ex: DionTraining.com = correct |
Active Interception | Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them |
Privilege Escalation | Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access |
Backdoors & Logic Bombs | Backdoors are used to bypass normal security and authentication functions Remote Access Trojan (RAT) is placed by an attacker to maintain persistent access Logic Bomb Easter Egg Logic bombs and Easter eggs should not be used according to secure coding standards |
Symptoms of Infection | Hard drives, files, or applications are not accessible anymore |
Malware Removal | o Identify symptoms of a malware infection If a boot sector virus is suspected, reboot the computer from an external device and scan it |
Preventing Malware | Viruses, worms, trojans, ransomware, spyware, rootkits, spam, worms, & trojans are best detected with anti-malware solutions Scanners can detect a file containing a rootkit before it is installed… Verify your email servers aren’t configured as open mail relays or SMTP open relays Remove email addresses from website |
Exploit Technique | Describes the specific method by which malware code infects a target host Most modern malware uses file-less techniques to avoid detection by signature-based security software How does an APT use modern malware to operate? Dropper or downloader Maintain access Strengthen access Actions on objectives Concealment |
Dropper | Malware designed to install or run other types of malware embedded in a payload on an infected host |
Downloader | A piece of code that connects to the Internet to retrieve additional tools after the initial infection by a dropper |
Shellcode | Any lightweight code designed to run an exploit on the target, which may include any type of code format from scripting languages to binary code |
Code Injection | Exploit technique that runs malicious code with the identification number of a legitimate process: Masquerading DLL injection DLL sideloading Process hollowing Droppers are likely to implement anti-forensics techniques to prevent detection and analysis |
Living Off the Land | Exploit techniques that use standard system tools and packages to perform intrusions Detection of an adversary is more difficult when they are executing malware code within standard tools and processes |
Vulnerability Scans (Credentialed vs. Non-Credentialed) | Credentialed: Non-credentialed: |