Statements (122)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:affects |
documents
network drives |
gptkbp:availability |
limited
|
gptkbp:behavior |
increased caution
caution in email handling |
gptkbp:can_lead_to |
financial loss
|
gptkbp:casualties |
individuals and businesses
|
gptkbp:caused_by |
data loss
|
gptkbp:community_impact |
increased vigilance
|
gptkbp:community_support |
collaborative efforts
|
gptkbp:demands |
gptkb:Bitcoin
|
gptkbp:developed_by |
gptkb:Crypto_Locker_developers
|
gptkbp:distributes |
email attachments
|
gptkbp:distribution |
malicious links
|
gptkbp:duration |
varies
|
gptkbp:economic_impact |
significant financial losses
|
gptkbp:education |
high
|
gptkbp:exported_to |
email attachments
|
gptkbp:family |
ransomware family
|
gptkbp:fire_department |
FBI involvement
arrests made |
gptkbp:first_appearance |
gptkb:2013
|
gptkbp:first_introduced |
inspired new variants
|
gptkbp:has_impact_on |
gptkb:High_School
|
gptkbp:has_variants |
different ransomware types
|
https://www.w3.org/2000/01/rdf-schema#label |
Crypto Locker
|
gptkbp:impact |
financial loss
data loss |
gptkbp:is |
a virus
|
gptkbp:is_a_tool_for |
limited effectiveness
|
gptkbp:is_aimed_at |
gptkb:software
cybersecurity initiatives cybersecurity researchers |
gptkbp:is_analyzed_in |
ongoing research
its impact on businesses malware analysts its encryption methods |
gptkbp:is_associated_with |
gptkb:Police_Department
|
gptkbp:is_atype_of |
individuals and organizations
|
gptkbp:is_considered |
gptkb:virus
a serious cybersecurity issue a form of extortion a growing problem in cybersecurity. a major concern for IT departments a major threat to data integrity a significant cybersecurity threat a significant risk to data security a threat to personal privacy |
gptkbp:is_discussed_in |
cybersecurity conferences
cybersecurity forums media reports |
gptkbp:is_known_for |
its rapid spread
lock files affect personal computers cause operational disruptions demand payment for decryption encrypt sensitive information extorting money target financial data |
gptkbp:is_often_depicted_as |
other ransomware
|
gptkbp:is_part_of |
cybercrime
ransomware family the digital threat landscape the malware landscape the ransomware epidemic |
gptkbp:is_protected_by |
gptkb:virus
security awareness training user education regular backups strong passwords security software solutions firewall protections not opening suspicious emails |
gptkbp:is_recognized_by |
file extensions change
|
gptkbp:is_related_to |
data breaches
|
gptkbp:is_used_for |
social engineering tactics
|
gptkbp:key |
difficult
unique per victim |
gptkbp:legislation |
influenced policy changes
|
gptkbp:managed_by |
law enforcement agencies
|
gptkbp:notable_event |
2013 outbreak
|
gptkbp:notable_feature |
file encryption
demand for ransom |
gptkbp:notable_traits |
file extension change
|
gptkbp:operating_system |
gptkb:operating_system
|
gptkbp:payment_methods |
gptkb:Bitcoin
gptkb:currency |
gptkbp:prize_money |
varied
|
gptkbp:provides_information_on |
backup importance
|
gptkbp:recognizes |
intrusion detection systems
signature-based detection |
gptkbp:replaced_by |
gptkb:virus
high |
gptkbp:reports_to |
gptkb:Police_Department
cybersecurity firms have high recovery costs |
gptkbp:requires |
decryption key
|
gptkbp:restoration |
limited
data recovery tools |
gptkbp:security_features |
gptkb:RSA
asymmetric encryption regular updates critical increased awareness increased investment user files file-based encryption files rendered inaccessible ransomware growth |
gptkbp:storage |
remote server
|
gptkbp:successor |
gptkb:Crypto_Wall
|
gptkbp:supports |
limited post-infection
|
gptkbp:targets |
gptkb:operating_system
|
gptkbp:threats |
gptkb:Gameover_Zeus
|
gptkbp:training |
recommended for users
|
gptkbp:type |
gptkb:virus
|
gptkbp:unlockable_content |
instructions for payment
|
gptkbp:user_interface |
ransom note
|
gptkbp:uses |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsParent |
gptkb:Locky
|
gptkbp:bfsLayer |
5
|