Malware and Ransomware
Across
- 1. A logic bomb is malware that is triggered by a specified condition, such as a given date or a particular user account being disabled
- 4. removable magnetic storage from the 70s
- 6. contains information about how the logical partitions are organized
- 9. contains machine code that is loaded into an endpoint’s memory by firmware during the startup process, before the operating system is loaded
- 11. malicious software or code, or damages an infected endpoint
- 14. allows an attacker to bypass authentication to gain access to a compromised system
- 15. gives an attacker full control and elevated privileges of an endpoint when installed
- 16. targets a computer network by replicating itself to spread rapidly
- 17. A virus is malware that is self-replicating but must first infect a host program and be executed by a user or process.
- 19. bug or flaw that exists in a system or software and creates a security risk
- 20. bug or flaw that exists in a system or software and creates a security risk
Down
- 2. A bootkit is malware that is a kernel-mode variant of a rootkit, commonly used to attack computers that are protected by full-disk encryption.
- 3. targets the boot sector or master boot record (MBR) of an endpoint’s storage drive or other removable storage media
- 5. A rootkit is malware that provides privileged (root-level) access to a compute
- 7. malware that disables legitimately installed antivirus software
- 8. Infects you to constantly show you different ads or collect your info to send you ads
- 10. abuses Telegram’s Bot API for C2 and data exfiltration
- 12. string of commands that leverages a vulnerability in a system or software
- 13. Ransomware is malware that locks a computer or device
- 18. collect information, such as internet surfing behavior, login credentials, and financial account information