2004 Lecture Notes - Lecture 3: Rootkit, Privilege Escalation, Ransomware
Document Summary
Any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. Design to track and spy on the user. Often includes activity trackers, keystroke collection, and data capture. Often bundles itself with legitimate software or with trojan horses. Advertising supported software is designed to automatically deliver advertisements. Often installed with some versions of software. Designed to only deliver advertisements but it is also common for adware to come with spyware. Designed to automatically perform action, usually online. Most bots are harmless, one increasing use of malicious bots are botnets. Infected with bots which are programmed to quietly wait for commands provided by the attacker. Designed to hold a computer system or the data it contains captive until a payment is made. Other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Spread by a downloaded file or some software vulnerability.