Statements (30)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Remote Access Trojan
|
gptkbp:alsoKnownAs |
IM
|
gptkbp:category |
malware
Cybersecurity threat Hacking tool |
gptkbp:developedBy |
gptkb:Imminent_Methods
|
gptkbp:features |
Microphone access
File transfer Keylogging Persistence mechanisms Remote shell Screen capture Webcam access |
gptkbp:firstReleased |
2013
|
https://www.w3.org/2000/01/rdf-schema#label |
Imminent Monitor
|
gptkbp:notableEvent |
Subject of international law enforcement takedown
Used in global cybercrime operations |
gptkbp:platform |
gptkb:Windows
|
gptkbp:seizedBy |
Law enforcement
|
gptkbp:seizureYear |
2019
|
gptkbp:status |
Discontinued
|
gptkbp:target |
gptkb:Australian_Federal_Police
gptkb:Europol gptkb:FBI |
gptkbp:usedFor |
cybercrime
Surveillance Remote control of computers |
gptkbp:website |
https://imminentmethods.net (defunct)
|
gptkbp:bfsParent |
gptkb:TA-92
|
gptkbp:bfsLayer |
5
|