Statements (30)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:malware
|
| gptkbp:abilities |
remote access
data exfiltration information theft keylogging |
| gptkbp:analyzes |
gptkb:Kaspersky_Lab
gptkb:Symantec |
| gptkbp:discoveredIn |
2011
|
| gptkbp:Duqu_2.0_analyzedBy |
gptkb:Kaspersky_Lab
|
| gptkbp:Duqu_2.0_discoveredIn |
2015
|
| gptkbp:Duqu_2.0_targeted |
gptkb:Iran_nuclear_talks
|
| gptkbp:exploits |
zero-day vulnerabilities
|
| gptkbp:firstReported |
gptkb:CrySyS_Lab
|
| gptkbp:hasVariant |
Duqu 2.0
|
| gptkbp:namedAfter |
~DQ prefix in files it creates
|
| gptkbp:notableFor |
modular architecture
stealth techniques use in targeted attacks |
| gptkbp:operates |
gptkb:Microsoft_Windows
|
| gptkbp:relatedTo |
gptkb:Stuxnet
|
| gptkbp:sharesCodeWith |
gptkb:Stuxnet
|
| gptkbp:target |
industrial control systems
|
| gptkbp:usedFor |
espionage
|
| gptkbp:writtenBy |
gptkb:C++
C |
| gptkbp:bfsParent |
gptkb:discovery_of_Duqu_malware
gptkb:Stuxnet_operation gptkb:Equation_Group |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Duqu malware
|