Ransomware Glossary (C)

  • Ransomware Glossary (C)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book.

C2 (Command and Control) Servers – External servers controlled by attackers that communicate with malware to send commands and receive stolen data.

Capacity Metrics – Measurements of a backup system’s storage, throughput, and processing capabilities.

CCPA (California Consumer Privacy Act) – California privacy regulation requiring breach notifications and consumer data protection.

CERT (Computer Emergency Response Team) – National or organizational teams that provide cybersecurity incident response services.

Certificate-based Authentication – An authentication method using digital certificates rather than passwords to verify identity.

Chain of Custody – Documented tracking of evidence handling from collection through analysis, crucial for legal proceedings and forensics.

Changed Block Tracking (CBT) – Technology that tracks which blocks on a disk have changed, enabling efficient incremental backups at the block level.

CISA (Cybersecurity and Infrastructure Security Agency) – United States federal agency responsible for cybersecurity and infrastructure protection, providing free resources, guidance, and incident response assistance.

Cl0p – A ransomware variant known for supply chain attacks and exploiting vulnerabilities like MOVEit.

Clean Room – See Sandbox Environment.

Cleaning – The process of removing malware while preserving the existing operating system, applications, and data (least reliable eradication method).

Clone/Cloning – Creating an exact duplicate of a virtual machine or system that can operate independently.

CMDB (Configuration Management Database) – A database that stores information about IT assets and their relationships within an organization.

Cobalt Strike – Originally a legitimate penetration testing tool, now widely weaponized by attackers for remote access and lateral movement.

Cold Site – A disaster recovery facility with basic infrastructure but no pre-installed systems, requiring complete setup during recovery.

Command and Control (C2) Server – A server controlled by attackers that sends commands to and receives data from compromised systems.

Common Vulnerability Scoring System (CVSS) – A standardized system for rating the severity of security vulnerabilities (0-10 scale).

Compliance – Adherence to legal, regulatory, or policy requirements (e.g., GDPR, HIPAA, PCI DSS, SOX, CCPA).

Configuration Management Database (CMDB) – A database that stores information about IT assets and their relationships within an organization.

Containment – The phase of incident response focused on preventing ransomware from spreading further while preparing for recovery.

Continuous Data Protection (CDP) – A backup method that continuously captures every change to data, allowing recovery to any point in time.

Conti – A ransomware variant known for wiping logs and aggressive attacks on critical infrastructure.

Correlation – The process of identifying relationships between different security events that together indicate malicious activity.

Credential Stuffing – An attack using stolen username/password combinations from one breach to attempt access to other services.

Cryptocurrency/Bitcoin – Digital currency commonly demanded in ransomware payments due to its difficulty to trace.

CSSP (Cybersecurity Service Provider) – Organizations providing specialized cybersecurity services including monitoring and incident response.

Cuckoo Sandbox – An open-source automated malware analysis tool for safely executing suspicious files.

Cumulative Incremental Backup – A backup that captures all changes since the last full backup, simplifying restoration compared to regular incrementals.

Curated Restore – An advanced restoration technique that automatically restores the latest clean version of each file before it was encrypted.

CVE (Common Vulnerabilities and Exposures) – A standardized identifier for publicly known security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.