ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 66 - ECSS discussion

Report
Export

Daniel, a professional hacker, targeted Alice and lured her into downloading a malicious app from a third-party app store. Upon installation, the core malicious code inside the application started infecting other legitimate apps in Alice's mobile device. Daniel overloaded Alice's device with irrelevant and fraudulent advertisements through the infected app for financial gain.

Identify the type of attack Daniel has launched in the above scenario.

A.

Agent Smith attack

Answers
A.

Agent Smith attack

B.

Bluebugging attack

Answers
B.

Bluebugging attack

C.

SMiShing attack

Answers
C.

SMiShing attack

D.

SIM card attack

Answers
D.

SIM card attack

Suggested answer: A

Explanation:

The scenario closely resembles the behavior of the Agent Smith malware campaign:

Agent Smith Modus Operandi:

Initial Compromise:Users are tricked into downloading seemingly benign apps from unofficial app stores, which contain the malicious payload.

Lateral Spread:Agent Smith infects other legitimate apps on the device, replacing their functionality.

Ad Fraud:The infected apps are used to display excessive, intrusive ads, generating revenue for the attacker.

Scenario Match:

Alice downloads from a third-party store, a common Agent Smith vector.

The malware spreads to other apps, a key feature of Agent Smith.

Ad-based profit motivates the attack, again aligning with Agent Smith.

asked 24/10/2024
fadi kako
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first