Week 3 - Malware Defenses

Attack vector graph sourced from lecture slides provided by Oregon State University CS373 There are four key things that malware do, first contact, code execution, establish presence, and perform malicious activity. First contact: can come in many different ways including email attachments, spoofing an ad network which is also known as malvertizing, instant messaging, poisoned search results, watering hole which is a term for poisoning a website that people routinely frequent, and physical contact such as a USB stick. Execute: there are three main methods of execution, social engineering, exploitation, and code that is passed as a feature and not a bug. Establish presence: the malware may try and blend in by having filenames that are very similar to operating system names. The malware can also modify date/time installation and modification. Malware can also hide in rootkits or bootkits. A piece of malware has to also persist after it has been established. The easiest ...