Malware and Ransomware

1234567891011121314151617
Across
  1. 2. A file type used in Windows that allows programs to share instructions in a single file
  2. 4. A programming method used to render code as unreadable
  3. 5. Malicious software or code that damages an infected endpoint
  4. 9. Malware that is set off by a particular event, such as a specific date
  5. 12. Malware that can lock a computer with an encryption key
  6. 13. Malware that is installed in the BIOS of a computer and provides root-level access to a computer
  7. 14. Abuses Telegram's Bot API for data theft
  8. 16. Targets a computer network and does not need to be executed by a user or process
  9. 17. Enables an attacker to use endpoints in a strategic manner to unload payloads
Down
  1. 1. A sequence of commands that takes advantage of a system vulnerability
  2. 3. Alters malware code to change the decryption routine
  3. 6. A cryptographic representation of a programs source code
  4. 7. A removable magnetic storage device, commonly available in 8-inch sizes
  5. 8. Malware that gives attackers the ability to bypass authentication for system access
  6. 10. A flaw that exists in a system that creates a security risk
  7. 11. Self-replicating malware that must infect a host program
  8. 15. Horse Malware disguised as a regular program that grants attackers access to an infected endpoint