Once a computer is infected with crypto-malware, how is the software controlled by the attacker?

Group of answer choices

The software monitors the victim's email for instructions via encoded messages.

The software connects to a command and control server to receive instructions or updates.

The software receives instructions via encrypted tunneled traffic from distributed sources.

The attacker connects to the computer remotely using ports opened by the malware.

1 answer

The correct answer is:

The software connects to a command and control server to receive instructions or updates.

In many cases of crypto-malware (or ransomware), the infected system typically communicates with a central command and control (C&C) server that the attacker controls. This C&C server can send updates or further instructions to the malware, including encryption keys or additional payloads.

Similar Questions
  1. QuestionWhat are the actual metal, plastic, and other physical parts of a computer or electronic device that you can touch known
    1. answers icon 1 answer
    1. answers icon 1 answer
  2. 1. Which of the following is NOT an example of malicious code?D. spy gear 2. What is malware short for? C. malicious software 3.
    1. answers icon 2 answers
    1. answers icon 1 answer
more similar questions