spreading rapidly to other systems to impact a large number of users payload RAT circulation trojan
circulation
the nefarious actions the malware performs flatulence concealment payload capabilitie payload
payload capabilities
a false warning, often contained in an email message claiming to come from the IT department hoax phishing whaling impersonation
Hoax
to watch an individual entering the security code on a keypad; a user casually observes someone entering secret information, such as the security code on a door keypad shoulder surfing spear phishing tailgating watering hole attack
shoulder surfing
delivers advertising content in a manner that is unexpected and unwanted by the user backdoor impersonation adware spyware
adware
avoiding detection by hiding its presence from software scanners that are looking for malware concealment virus rootkit worm
concealment
digging through trash receptacles to find information that can be useful in an attack watering hole attack tailgating dumpster diving shoulder surfing
dumpster diving
a malicious program that uses a computer network to replicate trojan concealment virus worm
worm
used to delete data; a computer code that is typicaly added to a legitimate program but lies dormant until a specific logical event triggers it logic bomb backdoor time bomb whaling
logic bomb
an executable program that masquerades as performing a benign activity but also does something malicious worm trojan RAT virus
trojan
once an authorized person opens the door, one or more individuals can follow behind and also enter dumpster diving mantrap shoulder surfing tailgating
tailgating
gives access to a computer, program, or service that circumvents any normal security protections social engineering rootkit spyware backdoor
backdoor
gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols trojan worm RAT virus
RAT
a means of gathering information for an attack by relying on the weaknesses of individuals phishing whaling gregarious social engineering
social engineering
sending millions of generic emails; targetting specific users vishing whaling phishing spear phishing
spear phishing
to masquerade as a real or fictitious character and then play out the role of that person on a victim impersonation hoax identity theft phishing
impersonation
blocking the user from accessing the computer; encrypting all files on the computer crypto-malware rootkit keylogger ransomware
cypto-malware
directed toward a smaller group of specific individuals, such as the major executives working for a manufacturing company dumpster diving whaling social engineering watering hole attack
watering hole attack
a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code logic bomb concealment worm virus
virus
silently captures and stores each keystroke that a user types on the computer’s keyboard
keylogger
phishing
whaling
spyware
keylogger
prevents a user's device from properly and fully fuctioning until a fee is paid spyware crypto-malware ransomware rootkit
ransomware
tracking software that is deployed without the consent or control of the user spyware adware backdoor social engineering
spyware
targets the "big fish," namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful phishing spear phishing impersonation whaling
whaling
once the malware reaches a system, it must embed itself into that system. infection rootkit virus concealment
infection