How Can We Help?

 Section 19 – Malicious Activity: Overview

You are here:
< All Topics

Section 19 – Malicious Activity: Overview

This section typically covers:

Types of Malicious Code:

Viruses, worms, trojans, ransomware, rootkits, keyloggers

Attack Techniques:

Backdoors, logic bombs, privilege escalation, social engineering vectors

Indicators of Compromise (IOCs):

Unusual outbound traffic, user account anomalies, system file changes

APT (Advanced Persistent Threats):

Characteristics, lifecycle stages (reconnaissance, persistence, etc.)

Detection & Response:

Use of IDS/IPS, EDR, SIEM, endpoint monitoring

User Behaviour Analytics (UBA):

Tracking deviations from normal usage patterns

🔍 Key Concepts to Focus On:

Differences between malware types

Methods of infection and propagation

Real-world examples (e.g., WannaCry, SolarWinds)

Preventative controls (anti-malware, patching, access controls)

Containment and eradication strategies

🧪 Quiz Tip:

Look for “most effective first response” type questions

Be able to identify malware types based on described behaviours

 

 

SECTION 19 – MALICIOUS ACTIVITY: STUDY GUIDE (CompTIA Security+)
🔹 1. Malware Types and Characteristics
Malware Type Key Traits Delivery Example
Virus Needs host file, spreads when file is executed Email attachments, downloads Michelangelo virus
Worm Self-replicating, no host file needed Network scanning/exploitation Code Red, Conficker
Trojan Horse Disguised as legitimate software Software bundles, phishing Zeus Trojan
Ransomware Encrypts files, demands payment Phishing, RDP attacks WannaCry, Locky
Spyware Collects user info without consent Bundled installs CoolWebSearch
Keylogger Records keystrokes Trojan payloads Commercial or APT
Rootkit Hides malware in OS Exploits, social engineering Sony BMG rootkit
Logic Bomb Triggers on conditions Insider threats Timed code execution

🔹 2. Common Malware Behaviours
Persistence: Maintains access across reboots (e.g., registry keys, services)

Privilege Escalation: Gains higher permissions (e.g., kernel exploit)

Backdoors: Hidden method for reentry post-compromise

Polymorphic Malware: Changes its code to avoid detection

Fileless Malware: Runs in memory (uses PowerShell, WMI)

🔹 3. Indicators of Compromise (IOCs)
Unusual network traffic (to C2 servers)

Increased CPU usage (mining malware)

Unknown processes or services

Changes to system files or registry

Failed login attempts, account lockouts

🔹 4. Detection and Mitigation
Technique Tools Goal
Anti-malware/AV Windows Defender, Sophos Prevent & detect
EDR CrowdStrike, SentinelOne Endpoint threat response
IDS/IPS Snort, Suricata Detect network anomalies
SIEM Splunk, Graylog Log aggregation & alerting
Sandboxing FireEye, Cuckoo Isolate execution
Patching OS and apps Close vulnerabilities

🔹 5. Advanced Persistent Threats (APT)
Nation-state or sponsored actors

Multi-phase: Recon → Weaponize → Deliver → Exploit → Install → C2 → Exfil

Use zero-days, spear-phishing, lateral movement

Defense-in-depth required to contain

🔹 6. User Behavior Analytics (UBA)
Uses AI/ML to detect deviations (e.g., odd hours, large data uploads)

Correlates user activity with threat intelligence

🔚 Study Session Actions
Understand malware types by definition, vector, behavior

Practice identifying attack scenarios in quiz format

Learn detection stack: AV/EDR + SIEM + IDS + Sandboxing

Grasp APT lifecycle: persistence, stealth, privilege elevation

Tags:
Table of Contents