Search Header Logo
Cyber EOP - Types of Threats By Mr. B

Cyber EOP - Types of Threats By Mr. B

Assessment

Presentation

Professional Development

12th Grade

Medium

Created by

Cyber Professor - Mr. B

Used 2+ times

FREE Resource

26 Slides • 28 Questions

1

media

Understanding Common
Malware Types and Their

Real-World Examples

Key Malware Threats to Be Aware of in 2024

2

Multiple Choice

What type of malware disables a victim's access to data until a ransom is paid?

1

Trojan

2

Spyware

3

Ransomware

4

Adware

3

media

Introduction to Malware

Malware refers to malicious software designed to damage, disrupt, or
steal data from systems.

In this presentation, we’ll cover common types of malware, what they do,
and real-world examples.

4

Explanation Slide...

Ransomware is a type of malware that locks or encrypts a victim's data, demanding a ransom for access restoration. Unlike Trojans, spyware, or adware, ransomware specifically targets data access for financial gain.

5

media

Ransomware: Holding Data Hostage

What It Does: Disables access to data until a ransom is paid.

Example:RYUK – Used to target critical infrastructure.

Real-World Case: The city of Baltimore was attacked by RobbinHood
ransomware, costing more than $18M.

6

Multiple Choice

Which malware type makes changes to files that are native to the operating system?

1

Fileless Malware

2

Wiper Malware

3

Keyloggers

4

Bots

7

Multiple Choice

What type of malware disables a victim's access to data until a ransom is paid?

1

Trojan

2

Spyware

3

Ransomware

4

Adware

8

Explanation Slide...

Fileless malware operates in memory and can manipulate native operating system files without leaving traditional traces, making it a significant threat. Other options like wiper malware and keyloggers do not specifically alter OS-native files.

9

media

Fileless Malware: Hiding in Plain Sight

What It Does: Modifies native OS files without installing new software.

Example:Astaroth – Alters legitimate Windows tools to steal credentials.

Key Point: Hard to detect, 10x more successful than traditional malware.

10

Multiple Choice

What is the primary function of spyware?

1

To collect user activity data without their knowledge

2

To serve unwanted advertisements

3

To disguise itself as desirable software

4

To replicate itself across networks

11

Multiple Choice

Which malware type makes changes to files that are native to the operating system?

1

Fileless Malware

2

Keyloggers

3

Wiper Malware

4

Bots

12

Explanation Slide...

The primary function of spyware is to collect user activity data without their knowledge, often for malicious purposes. This distinguishes it from other software types that may serve ads or replicate themselves.

13

media

Spyware: Monitoring Users Without Consent

What It Does: Collects sensitive data (passwords, browsing habits)
without user knowledge.

Example:DarkHotel – Targets high-profile individuals via hotel Wi-Fi.

Impact: Reduces performance and compromises sensitive data.

14

Multiple Choice

Which malware type is known for hijacking browsers to change default search engines?

1

Trojan

2

Ransomware

3

Worms

4

Adware

15

Multiple Choice

What is the primary function of spyware?

1

To disguise itself as desirable software

2

To collect user activity data without their knowledge

3

To serve unwanted advertisements

4

To replicate itself across networks

16

Explanation Slide...

Adware is a type of malware that often hijacks browsers to change default search engines and display unwanted ads. Unlike Trojans, ransomware, or worms, adware specifically targets browser settings.

17

media

Adware: The Ad Overload

What It Does: Serves unwanted advertisements based on user activity.

Example:Fireball – Infected 250M devices, hijacked browsers.

Risk: Breaches user privacy and enables ad click fraud.

18

Multiple Choice

What does a Trojan disguise itself as?

1

Malicious code

2

A legitimate application

3

A network worm

4

Desirable code or software

19

Multiple Choice

Which malware type is known for hijacking browsers to change default search engines?

1

Trojan

2

Worms

3

Ransomware

4

Adware

20

Explanation Slide...

A Trojan disguises itself as desirable code or software to trick users into downloading it, unlike malicious code which is overtly harmful. This deception is key to its ability to infiltrate systems.

21

media

Trojans: The Disguised Threat

What It Does: Disguises itself as legitimate software, often used to take
control of devices.

Example:Emotet – Banking Trojan, highly persistent and costly.

Real-World Case: Emotet has caused $1M in remediation costs per
incident.

22

Multiple Choice

Which malware was developed to target Iran's nuclear program?

1

Triada

2

Stuxnet

3

Emotet

4

Zacinlo

23

Multiple Choice

What does a Trojan disguise itself as?

1

Malicious code

2

A legitimate application

3

Desirable code or software

4

A network worm

24

Explanation Slide...

Stuxnet is a well-known malware specifically designed to disrupt Iran's nuclear program by targeting its industrial control systems, making it the correct answer.

25

media

Worms: The Self-Replicating Menace

What It Does: Spreads across networks by replicating itself.

Example:Stuxnet – Used to sabotage Iran’s nuclear program.

Impact: Exploits software vulnerabilities, spreads rapidly.

26

Multiple Choice

What is a keylogger primarily used for?

1

To serve advertisements

2

To launch DDoS attacks

3

To erase user data

4

To monitor user keystrokes

27

Multiple Choice

Which malware was developed to target Iran's nuclear program?

1

Triada

2

Emotet

3

Stuxnet

4

Zacinlo

28

Explanation Slide...

A keylogger is primarily used to monitor user keystrokes, capturing what users type on their keyboards. This can include sensitive information like passwords and personal messages, making it a tool for spying rather than for advertising or data deletion.

29

media

Rootkits: Silent Control of Your System

What It Does: Provides remote control over the infected system.

Example:Zacinlo – Infects via fake VPN, conducts ad fraud.

Real-World Case: Zacinlo removes competing malware to maintain
control.

30

Multiple Choice

What type of malware is known for creating a network of bots?

1

Wiper Malware

2

Bots/Botnets

3

Fileless Malware

4

Spyware

31

media

Keyloggers: Tracking Keystrokes

What It Does: Monitors and records user keystrokes.

Example:Olympic Vision – Used to steal business email data.

Threat: Can capture sensitive data such as passwords and banking
information.

32

Explanation Slide...

Bots/Botnets are a type of malware specifically designed to create networks of infected devices, known as bots, which can be controlled remotely. This distinguishes them from other types of malware like Wiper or Spyware.

33

Multiple Choice

What is a keylogger primarily used for?

1

To monitor user keystrokes

2

To serve advertisements

3

To launch DDoS attacks

4

To erase user data

34

Multiple Choice

Which malware type infects mobile devices?

1

Mobile Malware

2

Ransomware

3

Worms

4

Adware

35

media

Bots: Automated Tools for Attacks

What It Does: Bots perform automated tasks, often forming networks
(botnets) for massive attacks.

Example:Echobot – Targets IoT devices, used in DDoS attacks.

Impact: Can disrupt networks and services on a large scale.

36

Explanation Slide...

Mobile Malware specifically targets mobile devices, making it the correct choice. While ransomware, worms, and adware can affect various systems, Mobile Malware is designed for mobile platforms.


media

37

Multiple Choice

What type of malware is known for creating a network of bots?

1

Wiper Malware

2

Fileless Malware

3

Bots/Botnets

4

Spyware

38

Multiple Choice

What is the main purpose of wiper malware?

1

To serve unwanted advertisements

2

To collect user data

3

To disguise itself as legitimate software

4

To erase user data beyond recoverability

39

media

Mobile Malware: Attacking Mobile Devices

What It Does: Targets mobile phones, often through apps or phishing.

Example:Triada – Pre-installed on Android devices to show spam ads.

Key Risk: Increasingly targeting smartphones, impacting both consumers
and businesses.

40

Explanation Slide...

Wiper malware is specifically designed to erase user data beyond recoverability, making it a destructive threat. Unlike other malware types, its primary goal is data destruction rather than data theft or advertisement.

41

Multiple Choice

Which malware type infects mobile devices?

1

Worms

2

Mobile Malware

3

Ransomware

4

Adware

42

Multiple Choice

Which malware example is known for targeting hotel Wi-Fi networks?

1

DarkHotel

2

Echobot

3

Triada

4

Fireball

43

media

Wiper Malware: Data Destruction

What It Does: Erases data beyond recoverability.

Example:WhisperGate – Used in cyberattacks on Ukrainian government
systems.

Key Point: Used to cover tracks and disrupt organizations’ operations.

44

Explanation Slide...

DarkHotel is a malware specifically designed to target hotel Wi-Fi networks, exploiting vulnerabilities to steal sensitive information from guests. The other options do not have this specific focus.

45

Multiple Choice

Which malware type is known for erasing data and ensuring it can't be recovered?

1

Ransomware

2

Trojan

3

Fileless Malware

4

Wiper Malware

46

Multiple Choice

What type of malware is Olympic Vision?

1

Adware

2

Worm

3

Keylogger

4

Trojan

47

media

Conclusion

Malware continues to evolve, becoming stealthier and more damaging.

Prevention strategies include using up-to-date antivirus, strong
passwords, and employee education.

CrowdStrike Falcon® offers comprehensive protection through innovative
malware detection technologies.

48

Explanation Slide...

The primary function of bots in a botnet is to perform automated tasks, such as sending spam or launching attacks, without human intervention. This allows the botnet to operate efficiently and at scale.

49

Multiple Choice

What is the primary function of bots in a botnet?

1

To erase data

2

To monitor keystrokes

3

To disguise as legitimate software

4

To perform automated tasks

50

Multiple Choice

Which malware type is known for erasing data and ensuring it can't be recovered?

1

Ransomware

2

Trojan

3

Wiper Malware

4

Fileless Malware

51

Multiple Choice

What is the main characteristic of fileless malware?

1

It installs software on the victim's device

2

It makes changes to existing files without installation

3

It is easily detected by antivirus software

4

It requires user interaction to spread

52

Multiple Choice

What type of malware is designed to steal sensitive information such as passwords?

1

Adware

2

Spyware

3

Ransomware

4

Wiper Malware

53

Multiple Choice

Which malware type is often spread through email attachments or links?

1

Trojan

2

Worms

3

Fileless Malware

4

Keyloggers

54

Multiple Choice

What is the main goal of ransomware?

1

To collect user data

2

To encrypt files and demand payment

3

To display unwanted ads

4

To monitor user activity

media

Understanding Common
Malware Types and Their

Real-World Examples

Key Malware Threats to Be Aware of in 2024

Show answer

Auto Play

Slide 1 / 54

SLIDE