Netsky

GPTKB entity

Statements (89)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:affects gptkb:Microsoft_Windows
gptkbp:can_be_spread_through file sharing
infected USB drives
gptkbp:can_cause network congestion
data loss
system slowdowns
gptkbp:can_create backdoors
gptkbp:can_detect gptkb:virus
gptkbp:can_download additional malware
gptkbp:can_lead_to identity theft
gptkbp:case_analysis malware analysis
gptkbp:cause home users
business networks
gptkbp:created_by gptkb:Eugene_Kaspersky
Ben Edelman
gptkbp:discovered_by gptkb:2004
gptkbp:diseases Windows operating systems
gptkbp:has_impact_on internet traffic
gptkbp:has_variants gptkb:Netsky._A
gptkb:Netsky._B
gptkb:Netsky._C
gptkb:Netsky._D
gptkb:Netsky._E
gptkb:Netsky._F
gptkb:Netsky._G
gptkb:Netsky._H
gptkb:Netsky._I
gptkb:Netsky._J
gptkb:Netsky._K
gptkb:Netsky._L
gptkb:Netsky._M
gptkb:Netsky._N
gptkb:Netsky._O
gptkb:Netsky._P
gptkb:Netsky._Q
gptkb:Netsky._R
gptkb:Netsky._S
gptkb:Netsky._T
gptkb:Netsky._U
gptkb:Netsky._V
gptkb:Netsky._W
gptkb:Netsky._X
gptkb:Netsky._Y
gptkb:Netsky._Z
gptkbp:historical_event computer viruses
https://www.w3.org/2000/01/rdf-schema#label Netsky
gptkbp:is_a_subject_of gptkb:academic_research
gptkb:Cybersecurity
gptkbp:is_analyzed_in security researchers
gptkbp:is_associated_with phishing schemes
spam emails
gptkbp:is_cited_in security advisories
gptkbp:is_known_for self-replication
high infection rates
gptkbp:is_known_to_exploit security vulnerabilities
gptkbp:is_notable_for spreading rapidly
using social engineering tactics
being a part of the malware epidemic in the early 2000s
being a polymorphic worm
being detected by antivirus software
being one of the most widespread worms
causing significant damage
infecting millions of computers
influencing future malware design
leading to the creation of removal tools
gptkbp:is_often_discussed_in online forums
cybersecurity reports
gptkbp:is_often_removed_by malware removal tools
gptkbp:is_often_seen_in gptkb:Bagle_virus
gptkbp:is_often_used_in social engineering tactics
gptkbp:is_part_of cyber threat landscape
malware family
gptkbp:is_referenced_in cybersecurity literature
gptkbp:is_related_to DDo S attacks
gptkbp:is_threatened_by cybersecurity
gptkbp:issues IT administrators
gptkbp:notable_examples worm propagation techniques
gptkbp:often_includes malware databases
gptkbp:scientific_classification gptkb:virus
gptkbp:spread_to email attachments
gptkbp:type gptkb:virus
worm
gptkbp:type_of network worm
gptkbp:uses P2 P networks
exploits in Microsoft Outlook
gptkbp:was_prevalent_in early 2000s
gptkbp:bfsParent gptkb:Amsterdam_Dance_Event
gptkbp:bfsLayer 4