gptkbp:instanceOf
|
cybercrime
|
gptkbp:affects
|
gptkb:Windows_operating_system
gptkb:macOS
gptkb:Linux
mobile devices
|
gptkbp:alsoKnownAs
|
Man-in-the-Browser attacks
|
gptkbp:canBeBypassedBy
|
two-factor authentication
|
gptkbp:canBeCaptured
|
login credentials
session cookies
|
gptkbp:canInject
|
malicious scripts
|
gptkbp:canIntercept
|
user input
|
gptkbp:canRedirect
|
transactions
|
gptkbp:commonlyTargets
|
e-commerce
online banking
|
gptkbp:detects
|
anti-malware software
|
gptkbp:exploits
|
browser vulnerabilities
|
gptkbp:firstReported
|
2007
|
https://www.w3.org/2000/01/rdf-schema#label
|
MitB attacks
|
gptkbp:involves
|
malware infection
|
gptkbp:mitigatedBy
|
endpoint protection
browser security updates
|
gptkbp:notableExample
|
gptkb:Gozi
gptkb:SpyEye
gptkb:Zeus_Trojan
|
gptkbp:notableRelease
|
web page content
|
gptkbp:perpetrator
|
cybercriminals
|
gptkbp:prevention
|
user education
regular software updates
secure browsing practices
|
gptkbp:relatedTo
|
keyloggers
form grabbing
Man-in-the-Middle attacks
|
gptkbp:target
|
web browsers
|
gptkbp:usedFor
|
gptkb:fraud
stealing credentials
|
gptkbp:uses
|
Trojan horse malware
|
gptkbp:bfsParent
|
gptkb:man-in-the-browser_attacks
|
gptkbp:bfsLayer
|
7
|