Statements (59)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:IRIX
|
gptkbp:associated_with |
gptkb:Espionage
cybersecurity threats data breaches phishing attacks identity theft online fraud illegal online activities spam emails ransomware distribution scareware tactics |
gptkbp:controls |
C& C servers
|
gptkbp:created_by |
Vladimir Tsastsin
|
gptkbp:disrupted_by |
gptkb:law_enforcement
gptkb:Operation_Ghost_Click gptkb:Operation_Tovar |
gptkbp:disrupted_in |
gptkb:2017
|
gptkbp:first_appearance |
gptkb:2010
|
https://www.w3.org/2000/01/rdf-schema#label |
Kelihos v1
|
gptkbp:infected |
millions of computers
|
gptkbp:involved_in |
DDo S attacks
|
gptkbp:is_linked_to |
money laundering
various cybercrimes various hacking groups various malware families |
gptkbp:is_targeted_at |
gptkb:operating_system
individuals and organizations |
gptkbp:is_used_to |
distribute fake antivirus software
facilitate other cyber attacks steal personal information |
gptkbp:is_utilized_for |
spreading misinformation
ad fraud credential harvesting click fraud |
gptkbp:is_vulnerable_to |
vulnerabilities in software
|
gptkbp:known_for |
its resilience
its adaptability high volume of spam |
gptkbp:notorious_for |
sending unsolicited messages
|
gptkbp:operated_by |
gptkb:Cybermen
|
gptkbp:operates |
multiple countries
|
gptkbp:reported_by |
security researchers
|
gptkbp:spread_to |
social media platforms
malicious links malicious attachments drive-by downloads |
gptkbp:spread_via |
social engineering tactics
|
gptkbp:successor |
gptkb:Kelihos_v2
|
gptkbp:target_market |
gptkb:government
gptkb:financial_services healthcare retail |
gptkbp:used_for |
data theft
spamming distributing malware |
gptkbp:used_in |
botnet attacks
|
gptkbp:utilized |
peer-to-peer architecture
|
gptkbp:bfsParent |
gptkb:Kelihos_botnet
|
gptkbp:bfsLayer |
6
|