Difference between revisions of "Blended Threat"

From WOT Wiki
Jump to: navigation, search
(Created page with 'A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan Horses and malicious code into one…')
 
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
A blended threat is a sophisticated attack that bundles some of the worst aspects of [[Computer Virus|viruses]], worms, [[Trojan Horse|Trojan Horses]] and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities. To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a [[Backdoor|Backdoor]] and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
+
Blended threats are sophisticated attacks that bundle some of the worst aspects of [[Computer Virus|Viruses]], [[Computer Worm|Worms]], [[Trojan Horse|Trojan Horses]] and [[Malware]] into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagate using multiple methods, the attack can come from multiple points, and blended threats exploit vulnerabilities. To be considered a blended thread, the attack would normally transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it could also install a [[Backdoor]] and maybe damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while worms travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and P2P. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your executables, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time. [http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp]

Latest revision as of 11:59, 19 February 2012

Blended threats are sophisticated attacks that bundle some of the worst aspects of Viruses, Worms, Trojan Horses and Malware into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagate using multiple methods, the attack can come from multiple points, and blended threats exploit vulnerabilities. To be considered a blended thread, the attack would normally transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it could also install a Backdoor and maybe damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while worms travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and P2P. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your executables, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time. [1]