gptkbp:instance_of
|
gptkb:virus
|
gptkbp:affected_files
|
documents
|
gptkbp:affects
|
network drives
|
gptkbp:associated_threat_group
|
gptkb:Gameover_Zeus
|
gptkbp:can_be_dealt_with_by
|
law enforcement agencies
|
gptkbp:can_be_used_to
|
social engineering tactics
|
gptkbp:can_cause
|
data loss
|
gptkbp:can_detect
|
intrusion detection systems
signature-based detection
|
gptkbp:can_lead_to
|
financial loss
|
gptkbp:casualties
|
individuals and businesses
|
gptkbp:cybersecurity_awareness
|
critical
|
gptkbp:cybersecurity_best_practices
|
regular updates
|
gptkbp:cybersecurity_community_response
|
collaborative efforts
|
gptkbp:cybersecurity_impact
|
increased investment
|
gptkbp:cybersecurity_legislation
|
influenced policy changes
|
gptkbp:cybersecurity_response
|
increased awareness
|
gptkbp:cybersecurity_training
|
recommended for users
|
gptkbp:decryption_availability
|
limited
|
gptkbp:demands_ransom
|
gptkb:Bitcoin
|
gptkbp:developed_by
|
gptkb:Crypto_Locker_developers
|
gptkbp:distributing_method
|
email attachments
|
gptkbp:distribution
|
malicious links
|
gptkbp:encryption_duration
|
varies
|
gptkbp:encryption_impact
|
files rendered inaccessible
|
gptkbp:encryption_key
|
unique per victim
|
gptkbp:encryption_key_retrieval
|
difficult
|
gptkbp:encryption_key_storage
|
remote server
|
gptkbp:encrypts_files
|
user files
|
gptkbp:fire_department
|
FBI involvement
arrests made
|
gptkbp:first_appearance
|
gptkb:2013
|
gptkbp:has_been_restored
|
data recovery tools
|
gptkbp:has_impact_on
|
gptkb:business
|
gptkbp:has_variants
|
different ransomware types
|
https://www.w3.org/2000/01/rdf-schema#label
|
Crypto Locker
|
gptkbp:impact
|
financial loss
data loss
|
gptkbp:is
|
a virus
|
gptkbp:is_analyzed_in
|
its impact on businesses
malware analysts
its encryption methods
|
gptkbp:is_associated_with
|
gptkb:organized_crime
|
gptkbp:is_atype_of
|
individuals and organizations
|
gptkbp:is_considered
|
gptkb:virus
a serious cybersecurity issue
a form of extortion
a growing problem in cybersecurity.
a major concern for IT departments
a major threat to data integrity
a significant cybersecurity threat
a significant risk to data security
a threat to personal privacy
|
gptkbp:is_distributed_by
|
malicious links
|
gptkbp:is_known_for
|
its rapid spread
extorting money
|
gptkbp:is_known_to
|
lock files
affect personal computers
cause operational disruptions
demand payment for decryption
encrypt sensitive information
target financial data
|
gptkbp:is_often_discussed_in
|
cybersecurity conferences
cybersecurity forums
media reports
|
gptkbp:is_often_seen_in
|
other ransomware
|
gptkbp:is_part_of
|
cybercrime
ransomware family
the digital threat landscape
the malware landscape
the ransomware epidemic
|
gptkbp:is_recognized_by
|
file extensions change
|
gptkbp:is_related_to
|
data breaches
|
gptkbp:is_targeted_at
|
gptkb:Cybersecurity
cybersecurity initiatives
cybersecurity researchers
|
gptkbp:malware_analysis
|
ongoing research
|
gptkbp:malware_evolution
|
inspired new variants
|
gptkbp:malware_family
|
ransomware family
|
gptkbp:malware_impact
|
significant financial losses
|
gptkbp:malware_trends
|
ransomware growth
|
gptkbp:may_require_payment_in
|
gptkb:cryptocurrency
|
gptkbp:notable_case
|
2013 outbreak
|
gptkbp:notable_feature
|
file encryption
demand for ransom
|
gptkbp:notable_traits
|
file extension change
|
gptkbp:operating_system
|
gptkb:Windows
|
gptkbp:prevention
|
gptkb:virus
security awareness training
user education
regular backups
strong passwords
security software solutions
firewall protections
not opening suspicious emails
|
gptkbp:provides_guidance_on
|
backup importance
|
gptkbp:provides_support_for
|
limited post-infection
|
gptkbp:ransom_amount
|
varied
|
gptkbp:ransom_note_content
|
instructions for payment
|
gptkbp:ransom_payment_method
|
gptkb:Bitcoin
|
gptkbp:recovery_method
|
limited
|
gptkbp:removal_tool_availability
|
limited effectiveness
|
gptkbp:replaces
|
gptkb:virus
high
|
gptkbp:reported_by
|
gptkb:law_enforcement
cybersecurity firms
have high recovery costs
|
gptkbp:requires
|
decryption key
|
gptkbp:security
|
gptkb:RSA
asymmetric encryption
file-based encryption
|
gptkbp:spread_to
|
email attachments
|
gptkbp:successor
|
gptkb:Crypto_Wall
|
gptkbp:targets
|
gptkb:operating_system
|
gptkbp:type
|
gptkb:virus
|
gptkbp:user_behavior_change
|
increased caution
|
gptkbp:user_behavior_impact
|
caution in email handling
|
gptkbp:user_education_importance
|
high
|
gptkbp:user_impact_awareness
|
increased vigilance
|
gptkbp:user_interface
|
ransom note
|
gptkbp:uses
|
gptkb:crypt
|
gptkbp:bfsParent
|
gptkb:Locky
|
gptkbp:bfsLayer
|
5
|