Statements (36)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:IRIX
|
gptkbp:associated_with |
phishing attacks
identity theft |
gptkbp:can |
install additional malware
send spam emails steal personal information |
gptkbp:control_system |
command and control servers
|
gptkbp:created_by |
gptkb:Russian_cybercriminals
|
gptkbp:diseases |
computers
|
gptkbp:distributes |
gptkb:virus
|
gptkbp:first_appearance |
gptkb:2017
|
gptkbp:has |
global reach
multiple versions botnet size of thousands |
https://www.w3.org/2000/01/rdf-schema#label |
Kelihos v2
|
gptkbp:is |
malicious software
often updated known for its resilience difficult to eradicate associated with organized crime a significant threat to cybersecurity a major player in the cybercrime ecosystem a target for law enforcement a type of malware a variant of Kelihos |
gptkbp:is_targeted_at |
gptkb:financial_institutions
|
gptkbp:is_vulnerable_to |
vulnerabilities
|
gptkbp:operates |
gptkb:Windows
|
gptkbp:successor |
gptkb:Kelihos_v1
|
gptkbp:used_for |
data theft
spamming distributing malware |
gptkbp:uses |
encryption techniques
peer-to-peer architecture |
gptkbp:bfsParent |
gptkb:Kelihos_botnet
|
gptkbp:bfsLayer |
6
|