Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
computer virus
|
gptkbp:aimsTo |
personal computers
|
gptkbp:associatedWith |
Denial of Service attacks
|
gptkbp:behavior |
self-replicating
|
gptkbp:canBe |
encryption techniques
system slowdown |
gptkbp:createdBy |
unknown
|
gptkbp:demonym |
user files
|
gptkbp:disassembly |
yes
|
gptkbp:distributes |
high
|
gptkbp:distribution |
file sharing
|
gptkbp:hasVariants |
Netsky.A,_Netsky.B,_Netsky.C
|
https://www.w3.org/2000/01/rdf-schema#label |
Netsky.P
|
gptkbp:impact |
Windows operating system
data loss |
gptkbp:influencedBy |
home users
|
gptkbp:isAttendedBy |
malware analysts
|
gptkbp:isConsidered |
a nuisance
|
gptkbp:isDistributedBy |
infected websites
|
gptkbp:isFiledIn |
gptkb:C++
|
gptkbp:isInvolvedIn |
spamming
|
gptkbp:isKnownFor |
high infection rates
cause network congestion |
gptkbp:isMaintainedBy |
specific signatures
|
gptkbp:isPartOf |
cybersecurity discussions
malware family up-to-date antivirus software |
gptkbp:isPortrayedBy |
January 2004
security researchers security bulletins |
gptkbp:isTargetedAt |
gptkb:Windows_XP
|
gptkbp:isTrainedIn |
cybersecurity firms
|
gptkbp:isUsedFor |
malicious software
firewalls system settings antivirus scans |
gptkbp:knownFor |
spreading via social engineering tactics
|
gptkbp:locatedIn |
2004
|
gptkbp:mayHave |
identity theft
backdoor access |
gptkbp:notableFor |
spreading rapidly
|
gptkbp:numberOfStudents |
manual deletion
|
gptkbp:propagationMethod |
email attachments
|
gptkbp:publishedIn |
C programming language
|
gptkbp:relatedTo |
other_Netsky_variants
|
gptkbp:signature |
unique hash value
|
gptkbp:skills |
vulnerabilities in software
|
gptkbp:type |
worm
|
gptkbp:uses |
files
peer-to-peer networks |
gptkbp:variant |
gptkb:Netsky_family
|
gptkbp:visitedBy |
antivirus software
|