Lesson 13 Topic A

1234567891011121314151617181920212223242526272829303132
Across
  1. 2. A controlled environment used to safely execute and observe malware.
  2. 4. Adware or spyware often disguised as grayware.
  3. 5. Advanced malware that avoids writing files to disk.
  4. 7. Virus that changes its code dynamically to evade detection.
  5. 9. Malicious software that records keystrokes.
  6. 10. Small tracking file stored by browsers, not malware but often abused.
  7. 12. A compromised computer that becomes part of a botnet.
  8. 14. Database of known TTPs and IoCs maintained by MITRE.
  9. 18. Malware designed to hide itself at the kernel level.
  10. 19. A covert channel attackers use to control malware remotely.
  11. 21. Remote control malware that gives an attacker covert access.
  12. 23. Fake malware alert messages designed to scare users.
  13. 24. A virus that remains active in memory even if the host process ends.
  14. 26. Script-based virus that spreads using document macros.
  15. 27. The most privileged system level in Windows (Ring 0).
  16. 29. Performance issue (e.g., high CPU or memory leaks) that may indicate malware.
  17. 30. Invisible tracking image sometimes embedded in websites.
  18. 31. Malicious script that activates only on a certain time or event.
  19. 32. Software installed with confusing consent; not always malicious.
Down
  1. 1. Ransomware variant that encrypts files and demands payment.
  2. 3. Malware that masquerades as a legitimate system file.
  3. 6. Hidden sign of compromise left after an attack.
  4. 8. Extortion malware that locks or encrypts data.
  5. 11. Malware hidden inside software that appears legitimate.
  6. 13. A group of bots under one attacker’s control.
  7. 15. Suspicious login activity showing a user logging in from two places at once.
  8. 16. Malware that replicates by infecting executable files.
  9. 17. Type of virus that hides in the boot sector of a disk or USB.
  10. 20. Malware that spreads automatically across networks without user action.
  11. 22. Malware that hijacks resources for cryptocurrency mining.
  12. 24. Log tampering where entries are deleted or timestamps altered.
  13. 25. Another term for bloatware or software bundled without clear consent.
  14. 28. Spyware technique that silently redirects users to fake sites.