Across
- 2. A controlled environment used to safely execute and observe malware.
- 4. Adware or spyware often disguised as grayware.
- 5. Advanced malware that avoids writing files to disk.
- 7. Virus that changes its code dynamically to evade detection.
- 9. Malicious software that records keystrokes.
- 10. Small tracking file stored by browsers, not malware but often abused.
- 12. A compromised computer that becomes part of a botnet.
- 14. Database of known TTPs and IoCs maintained by MITRE.
- 18. Malware designed to hide itself at the kernel level.
- 19. A covert channel attackers use to control malware remotely.
- 21. Remote control malware that gives an attacker covert access.
- 23. Fake malware alert messages designed to scare users.
- 24. A virus that remains active in memory even if the host process ends.
- 26. Script-based virus that spreads using document macros.
- 27. The most privileged system level in Windows (Ring 0).
- 29. Performance issue (e.g., high CPU or memory leaks) that may indicate malware.
- 30. Invisible tracking image sometimes embedded in websites.
- 31. Malicious script that activates only on a certain time or event.
- 32. Software installed with confusing consent; not always malicious.
Down
- 1. Ransomware variant that encrypts files and demands payment.
- 3. Malware that masquerades as a legitimate system file.
- 6. Hidden sign of compromise left after an attack.
- 8. Extortion malware that locks or encrypts data.
- 11. Malware hidden inside software that appears legitimate.
- 13. A group of bots under one attacker’s control.
- 15. Suspicious login activity showing a user logging in from two places at once.
- 16. Malware that replicates by infecting executable files.
- 17. Type of virus that hides in the boot sector of a disk or USB.
- 20. Malware that spreads automatically across networks without user action.
- 22. Malware that hijacks resources for cryptocurrency mining.
- 24. Log tampering where entries are deleted or timestamps altered.
- 25. Another term for bloatware or software bundled without clear consent.
- 28. Spyware technique that silently redirects users to fake sites.
