Malware
Widely used toolkits include:
Examples of organized Attack sources
Worm
Without user action, the Worm program that propagates copies of itself to other computers.
Logic bomb
triggers action when condition occurs
Trojan horse
program that contains unexpected additional functionality.
Backdoor
Clickjacking
Vulnerability used by an attacker to collect an infected user’s clicks
Virus lifecycle
propagation , what order and functions
Virus lifecycle
Dormant , what order and functions
Virus lifecycle
Execution , what order and functions
Virus lifecycle
Trigger , what order and functions
Virus classification
by Target
Virus classification
by concealment / hiding
transport vehicles
Spam (uninvited)
Botnet
A collection of bots capable of acting in a coordinated manner
Zombies can be used to make:
Keylogger
To allow monitor sensitive information
Spyware
Compromised machine to allow monitor a wide range of activity on the system
Rootkit classification: