My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyberattack Techniques and Types – Malware and Ransomware

Horizontales
used to avoid detection by traditional signature-based anti-malware tools and software.
a ransomware attack infected more than 230,000 vulnerable Windows computers in more than 150 countries worldwide. Although the attack was quickly halted after the discovery of a “kill switch,” the total economic damage is estimated between hundreds of millions to as much as US$4 billion, despite the perpetrators collecting only 327 ransom payments totaling about US$130,000.
techniques to hide certain binary strings that are characteristically used in malware and therefore are easily detected by anti-malware signatures, or to hide an entire malware program.
malware that provides privileged (root-level) access to a computer.
enables an attacker to use various endpoints strategically to accomplish specific desired tasks, such as stealing credit card numbers, sending spam containing other malware payloads (such as spyware), or installing ransomware for the purpose of extortion.
malware that disables legitimately installed antivirus software on the compromised endpoint, thereby preventing automatic detection and removal of other malware.
malware that locks a computer or device or encrypts data on an infected endpoint with an encryption key that only the attacker knows, thereby making the data unusable until the victim pays a ransom (usually cryptocurrency, such as Bitcoin).
a cryptocurrency-mining Trojan that has been sold on various underground forums since June 2017 and has been used by countless criminals since then.
malware that typically targets a computer network by replicating itself to spread rapidly.
Verticales
malware that is disguised as a harmless program but actually gives an attacker full control and elevated privileges of an endpoint when installed.
malware that allows an attacker to bypass authentication to gain access to a compromised system.
types of malware that collect information, such as internet surfing behavior, login credentials, and financial account information on an infected endpoint.
abuses Telegram’s Bot API for C2 and data exfiltration.
malware that is triggered by a specified condition, such as a given date or a particular user account being disabled.
malware that is a kernel-mode variant of a rootkit, commonly used to attack computers that are protected by full-disk encryption.
typically masquerades as legitimate Android system and VPN apps, and sometimes drops and installs legitimate versions of other apps as a decoy.
malware that is self-replicating but must first infect a host program and be executed by a user or process.