Lesson 13
Lesson 13: Analyze Indicators of Malicious Activity
Malware Attack Indicators
Viruses vs Worms:
Viruses: Attach to legitimate programs/files, require user interaction, spread via file sharing/email/USBWorms: Self-replicating, no host file needed, no user action required, exploit network vulnerabilities, consume bandwidth
Trojans vs PUPs/PUAs:
Trojans: Malicious programs disguised as legitimate apps, open backdoors, install keyloggers/RATs, intentionally maliciousPUPs/PUAs (Potentially Unwanted Programs): Installed without clear consent, adware/bloatware, degrade performance, not clearly malicious
Fileless Malware:
- Operates entirely in memory (no files written to disk)
- Uses legitimate tools (PowerShell, WMI)
- Maintains persistence through registry/scheduled tasks
- Difficult to detect with traditional antivirus, requires behavioral analysis
Ransomware vs Crypto-Malware:
Ransomware: Encrypts data or locks systems, demands ransom, disruptive, high visibilityCrypto-Malware (Cryptojacking): Hijacks resources to mine cryptocurrency, stealthy, runs in background, performance degradation
Rootkits:
- Gains and maintains privileged access (root/SYSTEM)
- Replaces core system files, hides processes, purges logs
- May reside in firmware or drivers
- Requires specialized detection tools (boot-time scanners, kernel-level analysis)
Backdoors and RATs:
Backdoors: Provide unauthorized access, may be intentional or inserted by malwareRATs (Remote Access Trojans): Full remote control (screen viewing, file access, remote shell), type of Trojan
Indicators of Compromise (IoCs):
- Unusual outbound traffic
- New unknown processes or services
- High CPU usage
- Altered or missing logs
- Unexpected login attempts
Physical and Network Attack Indicators
Physical Attacks:
Brute Force Entry: Breaking into server roomsEnvironmental Damage: Tampering with HVAC or powerRFID Cloning: Copying proximity-based access cardsSkimming: Capturing data from card readers
DDoS Attacks:
Overwhelming target with traffic from multiple systems (botnets)
Types:
SYN Flood: Exploits TCP handshake to consume resourcesReflected: Uses third-party servers to flood target with repliesAmplified: Uses protocols (DNS/NTP/SNMP) to multiply traffic size
On-Path (Man-in-the-Middle) Attacks:
Attacker intercepts communication between two parties
Methods:
ARP Poisoning: Spoofs MAC addresses in LANDNS Spoofing: Redirects users to malicious websites
Mitigations: Encryption (TLS), static ARP tables, DNSSEC
Wireless Attacks:
Evil Twin: Fake AP mimics real one to collect credentialsRogue AP: Unauthorized AP used to gain network accessDeauthentication Attack: Forces users off legitimate Wi-Fi
Credential Attacks:
Brute Force: Try all possible password combinations (single account, many passwords)Password Spraying: One password against many accountsPass-the-Hash: Uses NTLM hash instead of password (Windows systems)Pass-the-Ticket: Uses stolen Kerberos ticket (Kerberos environments)
Cryptographic Attacks:
Downgrade: Forces systems to use older, weaker encryptionCollision: Two different inputs produce same hashBirthday Attack: Probability-based collision attackWeak Cipher Exploits: Attacks on older algorithms (RC4, MD5)
Mitigations: Use TLS 1.3, SHA-256 or better, enforce forward secrecy
Application Attack Indicators
Privilege Escalation:
Vertical: User gains higher privileges (becomes admin)Horizontal: User gains access to another user's data
Replay Attacks:
Capturing and reusing valid authentication data (tokens/cookies) to gain unauthorized access
Forgery Attacks:
CSRF (Cross-Site Request Forgery): Tricks user's browser into executing unwanted actions on authenticated sitesSSRF (Server-Side Request Forgery): Forces vulnerable server to send requests to internal systems or cloud metadata
Injection Attacks:
Malicious code injected into application's input stream
Types:
SQL Injection: Alters SQL queriesLDAP Injection: Alters directory service queriesXML External Entity (XXE): Exploits XML parsers to access filesCommand Injection: Executes OS commands
Directory Traversal vs Command Injection:
Directory Traversal: Access unauthorized files using patterns (../../../etc/passwd)Command Injection: Executes shell commands via input fields
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources