Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber is Video Siris on the Comp. Tia Security Plus 5 +01 Certification and Exam.
00:07
I'm your instructor, Rahm Warner.
00:09
Please visit Cyber Eri died. I t. For more information on this certification and many others
00:15
in this video, we'll be discussing section 1.1
00:18
given a scenario. Analyzed indicators of compromise and determine the type of malware.
00:24
This is the first section in domain one on threats, attacks and vulnerabilities.
00:29
IOC are indicators of compromise These are indications that your system may have been breached or there may be some type of a security event. Malware or malicious software is a serious problem in today's computing environment. Malware software designed to harm a user's computer or data
00:48
or to steal their information.
00:51
As a security professional, you must recognize malicious code and know how to respond appropriately.
00:56
This section covers various types of malicious code you might encounter, including viruses, worms, Trojan horses, spyware, rukh, its body debts and logic bombs.
01:07
Be aware of different aspects associated with Mauer and how it could attack your system. What avenue it takes the threat vector and the path of destruction, as well as what type of damage will occur when that Mauer does in fact, a computing system.
01:23
For example, delivery. How does the Mauer get to the target? Is it through email or malicious website
01:30
Propagation is how the malware spreads.
01:34
How it gets to the target is one method. What it does at the target. It is the payload. So what does the malware do once it gets there?
01:44
Indicators. A compromise. IOC is an artifact observed on a network organ operating system that, with high confidence, indicates a computer intrusion.
01:55
Typical IOC's include virus signatures and I P addresses from known malicious sources. MD five hashes of malware files or you are Earls or domain names of botnet. Commanding control servers are other forms of IOC's.
02:09
As I mentioned early in this video, malware is malicious software.
02:15
It's a very broad term that we use to describe software that's performing bad functions, tower computer or other devices on our network.
02:23
You see examples of malware on your screen.
02:25
I'll talk about each of these through this video.
02:29
The first type of malware I'll discuss our viruses.
02:32
This was a term coined by Fred Colen. It's a program intended to damage a computer system. There are many different types of computer viruses. Let me explain a few.
02:45
An armored virus is a virus that is protected in a way that makes disassembling it difficult, so it has armor around it, protecting it from anti virus programs.
02:54
A companion virus is a virus that creates a new program that runs in the place of an expected program of the same name, for example, explorer Daddy XY. If it's of malware, it would take the place of the Explorer e X E within a window system.
03:09
A macro virus uses the macro feature in many applications, such as Microsoft Office. A multipart eat virus is a virus that attacks a system in more than one way. Take multiple paths. There may be multiple channels that uses to infect. The system could also have multiple payloads.
03:30
Fage virus is one that modifies our altars, other programs and databases. A polymorphic virus is one that changes, form or mutates in order to do in order to avoid detection. It's polymorphic. It changes the way it looks, acts or behaves
03:49
retroviruses, one that attacks or bypasses the antivirus software itself in order to hide its tracks.
03:55
A stealth virus is one that attempts to avoid detection by that A V software and from operating systems by remaining in memory, it runs in stealth.
04:06
I've covered many types of viruses. There are many more out there.
04:12
Be familiar with these as you're studying for security Plus and you as you're acting as a computer security professional,
04:18
a common malware or virus type we see infecting systems all over the world are crypto malware and ransomware.
04:28
This is malicious software that uses cryptography as part of the attack. It encrypts part of the operating system or files and holds those for ransom until the ransom is met, often by paying Bitcoin,
04:43
Ransomware also prevents users from accessing their system or personal files by locking those files.
04:49
RANSOMWARE authors order that a payment be sent by crypto currency on light payment systems
04:56
or credit card
04:58
Example of common crypto malware and ransomware include Crypto Locker, Wanna Cry Lak E Z Crip and not Petra.
05:06
Mauer often like to try to hide its tracks from anti virus. A root kit does exactly that. It's a clandestine computer program designed to provide continued privileged access to computer while hiding its presence.
05:21
It's also a software program that has the ability to obtain administrator or root level access
05:28
and hide from the operating system. Examples include Anti Root Kit, Zeus, Stuxnet, Narc and a Door.
05:35
A Trojan horse is another type of Mauer.
05:39
It's a harmful piece of software that looks legit or is included with legitimate applications. Remember from History, the Trojan horse. It looked benign on the outside but was malicious on the inside software. Trojan horses worked the same way
05:55
a Trojan horses also, any application that masquerades as one thing in order to get past scrutiny and then does some malicious activity.
06:03
One of the major differences between Trojan horses and viruses is that Trojan horses tend not to replicate themselves.
06:11
Examples of Trojan horse programs include Back Orifice, which is an old one that hit within the whack. A mole game. Stuxnet and Zeus
06:21
Worms are types of malware that replicate themselves to systems or devices automatically across the network and without any user intervention to spread, worms either exploit of vulnerability on the target system or use social engineering to trick users into executing it.
06:39
Examples of common worms include the I Love You Were My Doom, Storm Worm and a corner cova
06:46
and sequel Slammer.
06:48
A logic or time bomb is any code that's hidden within an application and causes something unexpected to happen based on criteria being met.
06:59
For example, a programmer hides a backdoor within the system. And for some reason the criteria is not Mac, because an infection across the network logic bombs is based on a logic or event happening a time Bob will happen based on a specific time or date.
07:16
Key lagers, also known as keystroke loggers, are programs or hardware devices that tracked the activities from input devices. For example, keys pressed on the keyboard, mouse clicks, screen recorders or scrapers.
07:31
They're a form of spyware where users are unaware that their actions are being tracked.
07:38
The actions are often not only track but sent to some type of centralized command and control. Server key logger software typically stores your keystrokes and a small file, which either access to later or automatically communicated to the person monitoring your actions.
07:55
But and but nets are another common form of Mauer.
08:00
A pot is an automated software program or network robot. It's often very small that collects information on Web systems,
08:09
and it's malicious form a pot is a compromise computer being controlled remotely. Bots are also known as zombie computers due to their ability to operate under remote direction without their owner's knowledge.
08:22
About Net is a network of bots network of the compromise computers under the control of a malicious actor also known as a command and control server.
08:33
So a CNC server will often run the botnet.
08:37
The Attackers who that control botnets are referred to as pot herders or bought masters.
08:43
A back door is an undocumented way of accessing the system, bypassing normal channels and normal authentication mechanisms. It can be done for malicious purposes on accident or to allow a back channel onto servers.
09:00
The opening left in a program application, usually by the developer, that allows additional access to system's applications or data.
09:09
These should be closed when the system is moved into production.
09:13
You can check for backdoors by scanning your network vulnerability analysis or pen tests.
09:20
A remote access Trojan or remote administration tool are rats.
09:26
This is software that remotely gives person full control of a technology device.
09:31
They're also known as programs that provide the capability to allow covert ceviche surveillance or the ability to gain unauthorized access to a victim PC.
09:41
Some examples of rats include Sub seven back orifice Pro Rat, Turco Dan and Poison Ivy.
09:50
Spyware and adware are types of malicious software that don't necessarily do harm. They're more like spying on you or providing you with advertising that you may not want
10:03
spyware and adware our applications that covertly monitor online behavior. Maybe without your knowledge or permission.
10:09
It collects data and relays it out toe outside party often used for advertising. Otherwise, it does not harm the infected computer users or their data.
10:20
There's a line between illegal spyware in the legitimate data collection,
10:24
the last indicator of compromise and were malware threat we'll talk about in this video is advanced. Persistent Threat or a P T.
10:35
This is a set of stealthy and continuous computer hacking process, often orchestrated by a person or persons targeting a specific entity.
10:45
A P T sometimes targets either private organizations, nation states or both for business or political motives.
10:54
A P T. Processes require high degree of covert nous over a long period of time.
11:01
The advanced process signifies sophisticated techniques using Mauer to exploit complicated vulnerabilities within systems.
11:09
The persistent process suggests that an external commanding control, or CNT, system
11:15
is continuously monitor in extracting data from the target systems.
11:20
The threat process indicates human involvement in orchestrating the attack.
11:26
AP Tease continued today and are troublesome part of cybersecurity.
11:31
Be familiar with how they work and how you can stop them on your corporate network.
11:37
In this video, I talked about numerous types of Mauer, including viruses, Ransomware Worms, Trojans, Rukh, its key lagers, AdWords, spyware box rats, logic bombs and back doors.
11:52
Let's practice what we've learned with some sample test questions.
11:58
Question one.
11:58
In your role as a security administrator, a user contacts you, suspecting that his computer is infected.
12:05
Yesterday he loaded a freeware program to help him perform a valid job function.
12:09
What type of malicious software is most likely the cause of the infection?
12:16
The answer is C. A Trojan War Trojan horse program it hides with legitimate software.
12:24
Question, too.
12:24
What type of malicious software is deliberately installed by an authorized user and sits dormant until some event in votes? It's malicious payload.
12:35
The answer is a A logic bomb.
12:41
This concludes the video for section 1.1, given a scenario analyze indicators of compromise and determined the type of Mauer
12:48
refer to your study material for more information on all of these topics.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor