Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Police_Department
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Hackers
|
gptkbp:alter_ego |
Legitimate Businesses
|
gptkbp:caused_by |
Financial Loss
Data Breach Identity Theft |
gptkbp:collaborates_with |
Other Criminals
|
gptkbp:faced |
Cybersecurity Measures
Legal Consequences |
https://www.w3.org/2000/01/rdf-schema#label |
Cybercriminal
|
gptkbp:is_committed_to |
Cybercrime
|
gptkbp:is_involved_in |
Credit Card Fraud
Phishing Scams Ransomware Attacks |
gptkbp:is_motivated_by |
gptkb:Revenge
Financial Gain Political Reasons Ideological Beliefs |
gptkbp:is_often_associated_with |
gptkb:Police_Department
|
gptkbp:is_part_of |
gptkb:Cybercrime_Syndicates
|
gptkbp:is_used_for |
gptkb:Botnets
gptkb:currency Social Engineering Spyware Exploit Kits Keyloggers Phishing Emails Remote Access Trojans Ad Fraud Techniques Anonymizing Tools Fake Websites |
gptkbp:may_have |
gptkb:Police_Department
gptkb:Money Human Error Vulnerabilities Scammer Phisher |
gptkbp:offers |
Hacking Tools
Stolen Data |
gptkbp:operates |
gptkb:Online
|
gptkbp:operates_in |
gptkb:Community_Center
In Groups Independently |
gptkbp:participated_in |
Data Theft
Denial of Service Attacks Fraudulent Transactions Credential Stuffing Account Takeover Intellectual Property Theft |
gptkbp:passes_through |
Detection
|
gptkbp:targets |
gptkb:smartphone
gptkb:Individuals gptkb:Educational_Institution gptkb:organization Government Agencies Healthcare Providers Retailers Io T Devices |
gptkbp:uses |
Malware
|