Statements (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
Cybersecurity Threat |
gptkbp:countermeasures |
Patch Management
Antivirus Software Web Filtering Browser Hardening Disabling Unused Plugins |
gptkbp:declinedAfter |
Improved Browser Security
Law Enforcement Takedowns Patch Adoption |
gptkbp:deliveredBy |
malware
Spyware Banking Trojans Malware Payloads |
gptkbp:distributedBy |
Compromised Websites
Drive-by Downloads Malvertising |
gptkbp:exploits |
Known Vulnerabilities
Zero-day Vulnerabilities |
gptkbp:firstAppearance |
2006
|
https://www.w3.org/2000/01/rdf-schema#label |
Exploit Kits
|
gptkbp:notableExample |
Angler Exploit Kit
Blackhole Exploit Kit Neutrino Exploit Kit Nuclear Exploit Kit Rig Exploit Kit |
gptkbp:status |
Declined after 2017
|
gptkbp:target |
Operating Systems
Web Browsers Browser Plugins |
gptkbp:usedFor |
Automated Exploitation of Vulnerabilities
|
gptkbp:bfsParent |
gptkb:CyberShades
|
gptkbp:bfsLayer |
7
|