Statements (30)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Remote_Access_Trojan
|
| gptkbp:alsoKnownAs |
IM
|
| gptkbp:category |
gptkb:malware
Cybersecurity threat Hacking tool |
| gptkbp:developedBy |
gptkb:Imminent_Methods
|
| gptkbp:features |
Microphone access
File transfer Keylogging Persistence mechanisms Remote shell Screen capture Webcam access |
| gptkbp:firstReleased |
2013
|
| gptkbp:notableEvent |
Subject of international law enforcement takedown
Used in global cybercrime operations |
| gptkbp:platform |
gptkb:Windows
|
| gptkbp:seizedBy |
Law enforcement
|
| gptkbp:seizureYear |
2019
|
| gptkbp:status |
Discontinued
|
| gptkbp:target |
gptkb:Australian_Federal_Police
gptkb:Europol gptkb:FBI |
| gptkbp:usedFor |
gptkb:Surveillance
gptkb:cybercrime Remote control of computers |
| gptkbp:website |
https://imminentmethods.net (defunct)
|
| gptkbp:bfsParent |
gptkb:TA-92
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Imminent Monitor
|