Malware
More Malware
Even more Malware
I think there's more Malware.
The most Malware.
100

This type of software is designed to do harm

What is Malware?

100

This software secretly monitors and collects personal information about users and sends it elsewhere

Spyware

100

This malware is named after a Greek myth because it disguises itself as legitimate software.

What is a Trojan

100

This malware locks a victim's data and demands payment to release it.

What is Ransomware?

100

This software records everything you type to steal passwords and credit card info.

What is a keylogger?

200

This type of malware requires user interaction or an "authorized program" to spread.

What is a Virus?

200

This type of spyware can pop ads or collect information about the user's web-surfing and consumer habits

Adware

200

This specific type of Trojan allows an attacker to control a victim's host remotely.

What is a RAT?

200

This specific sub-type of ransomware threatens to release stolen data publicly.

What is doxware?

200

This is the most common way Trojans enter a system (name two methods).

What are email attachments and free downloads?

300

Unlike a virus, this malware can self-replicate and spread across networks independently.

What is a worm?

300

This type of software is malicious, provides little or no benefit, and is sold using scare tactics

Scareware

300

It’s a method of bypassing normal security controls to access a system or data.

What is a backdoor?

300

This malware gains administrative access and hides its presence by altering system files.

What is a Rootkit?

300

Manufacturers pre-install this on devices to generate revenue, but it slows them down.

What is bloatware?

400

This type of malware hijacks a computer's CPU cycles to mine for digital currency.

What is crypto-malware?

400

This malware locks you out of all your programs and data, and demands payment before allowing access 

Ransomware

400

These are all examples of this concept: missing files, odd entries, strange file names, and slowed proccessing.

What are indication of compromise?

400

This "malware" uses fake antivirus alerts to trick users into paying for a "fix."

What is scarware?

400

This type of person is the weak link in the mitigation process.

What are employees?

500

This tool helps protect against keyloggers because it allows a user to log in without manually typing their saved password each time.

What is a password manager?

500

This malware is a type of trojan horse that lies idle until triggered by an event

Time bombs or Logic bombs

500

Developed by H.D. Moore in 2003, this premier open-source framework allows security researchers to find, exploit, and validate vulnerabilities using a massive database of payloads like Meterpreter.

What is metasploit?

500

This person is the most likely culprit to install a logic bomb.

What is a disgruntled employee or insider threat?

500

This "safe zone" or isolated virtual environment is where analysts execute malware to watch its behavior without risking the host system.

What is a sandbox?

M
e
n
u