Eve installed some spyware software on 100 USB flash drives and has designed this software to autoload from these drives along with some nude photos. She then painted the logo of a well-known adult magazine on each one and randomly scattered these flash drives in the parking lots of several of the big defense companies in her town. What type of malware attack is this and what vulnerability is she
trying to exploit in order to get her malware code past the network firewalls of these companies?
What will be an ideal response?
This is a Trojan horse attack, since the users are probably expecting the nude
photos, given the logo, but are not expecting the spyware. Eve is trying to get employees
of these companies to insert these USB flash drives in their company computers (inside the
firewall) and exploit a vulnerability of having auto-execution enabled, so that the spyware
autoloads along with the expected nude photos.
You might also like to view...
To make two effects run at the same time, apply the Simultaneous option
Indicate whether the statement is true or false
The current clear front-runner for most IPv4-to-IPv6 transitions is which of the following methods?
A. dual-stack method B. 6to4 method C. Teredo method D. ISATAP method