Statements (33)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:malware
gptkb:Cybersecurity_Threat |
| gptkbp:countermeasures |
Patch Management
Antivirus Software Web Filtering Browser Hardening Disabling Unused Plugins |
| gptkbp:declinedAfter |
Improved Browser Security
Law Enforcement Takedowns Patch Adoption |
| gptkbp:deliveredBy |
gptkb:malware
Spyware Banking Trojans Malware Payloads |
| gptkbp:distributedBy |
Compromised Websites
Drive-by Downloads Malvertising |
| gptkbp:exploits |
Known Vulnerabilities
Zero-day Vulnerabilities |
| gptkbp:firstAppearance |
2006
|
| gptkbp:notableExample |
Angler Exploit Kit
Blackhole Exploit Kit Neutrino Exploit Kit Nuclear Exploit Kit Rig Exploit Kit |
| gptkbp:status |
Declined after 2017
|
| gptkbp:target |
Operating Systems
Web Browsers Browser Plugins |
| gptkbp:usedFor |
Automated Exploitation of Vulnerabilities
|
| gptkbp:bfsParent |
gptkb:CyberShades
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Exploit Kits
|