gptkbp:instance_of
|
gptkb:virus
|
gptkbp:affects
|
gptkb:Microsoft_Windows
|
gptkbp:can_be_spread_through
|
file sharing
infected USB drives
|
gptkbp:can_cause
|
network congestion
data loss
system slowdowns
|
gptkbp:can_create
|
backdoors
|
gptkbp:can_detect
|
gptkb:virus
|
gptkbp:can_download
|
additional malware
|
gptkbp:can_lead_to
|
identity theft
|
gptkbp:case_analysis
|
malware analysis
|
gptkbp:cause
|
home users
business networks
|
gptkbp:created_by
|
gptkb:Eugene_Kaspersky
Ben Edelman
|
gptkbp:discovered_by
|
gptkb:2004
|
gptkbp:diseases
|
Windows operating systems
|
gptkbp:has_impact_on
|
internet traffic
|
gptkbp:has_variants
|
gptkb:Netsky._A
gptkb:Netsky._B
gptkb:Netsky._C
gptkb:Netsky._D
gptkb:Netsky._E
gptkb:Netsky._F
gptkb:Netsky._G
gptkb:Netsky._H
gptkb:Netsky._I
gptkb:Netsky._J
gptkb:Netsky._K
gptkb:Netsky._L
gptkb:Netsky._M
gptkb:Netsky._N
gptkb:Netsky._O
gptkb:Netsky._P
gptkb:Netsky._Q
gptkb:Netsky._R
gptkb:Netsky._S
gptkb:Netsky._T
gptkb:Netsky._U
gptkb:Netsky._V
gptkb:Netsky._W
gptkb:Netsky._X
gptkb:Netsky._Y
gptkb:Netsky._Z
|
gptkbp:historical_event
|
computer viruses
|
https://www.w3.org/2000/01/rdf-schema#label
|
Netsky
|
gptkbp:is_a_subject_of
|
gptkb:academic_research
gptkb:Cybersecurity
|
gptkbp:is_analyzed_in
|
security researchers
|
gptkbp:is_associated_with
|
phishing schemes
spam emails
|
gptkbp:is_cited_in
|
security advisories
|
gptkbp:is_known_for
|
self-replication
high infection rates
|
gptkbp:is_known_to_exploit
|
security vulnerabilities
|
gptkbp:is_notable_for
|
spreading rapidly
using social engineering tactics
being a part of the malware epidemic in the early 2000s
being a polymorphic worm
being detected by antivirus software
being one of the most widespread worms
causing significant damage
infecting millions of computers
influencing future malware design
leading to the creation of removal tools
|
gptkbp:is_often_discussed_in
|
online forums
cybersecurity reports
|
gptkbp:is_often_removed_by
|
malware removal tools
|
gptkbp:is_often_seen_in
|
gptkb:Bagle_virus
|
gptkbp:is_often_used_in
|
social engineering tactics
|
gptkbp:is_part_of
|
cyber threat landscape
malware family
|
gptkbp:is_referenced_in
|
cybersecurity literature
|
gptkbp:is_related_to
|
DDo S attacks
|
gptkbp:is_threatened_by
|
cybersecurity
|
gptkbp:issues
|
IT administrators
|
gptkbp:notable_examples
|
worm propagation techniques
|
gptkbp:often_includes
|
malware databases
|
gptkbp:scientific_classification
|
gptkb:virus
|
gptkbp:spread_to
|
email attachments
|
gptkbp:type
|
gptkb:virus
worm
|
gptkbp:type_of
|
network worm
|
gptkbp:uses
|
P2 P networks
exploits in Microsoft Outlook
|
gptkbp:was_prevalent_in
|
early 2000s
|
gptkbp:bfsParent
|
gptkb:Amsterdam_Dance_Event
|
gptkbp:bfsLayer
|
4
|