gptkbp:instance_of
|
gptkb:virus
|
gptkbp:amended_by
|
system settings
|
gptkbp:can_create
|
backdoors
|
gptkbp:can_lead_to
|
data loss
|
gptkbp:caused_by
|
system slowdowns
|
gptkbp:created_by
|
gptkb:unknown
|
gptkbp:distributes
|
itself via email
|
gptkbp:distribution
|
infected attachments
|
gptkbp:enables
|
firewalls
|
gptkbp:exported_to
|
through network shares
|
gptkbp:first_appearance
|
gptkb:2004
|
gptkbp:has_variants
|
gptkb:Netsky._A
gptkb:Netsky._B
gptkb:Netsky._C
gptkb:Netsky._D
|
https://www.w3.org/2000/01/rdf-schema#label
|
Netsky. F
|
gptkbp:is_aimed_at
|
Windows users
|
gptkbp:is_analyzed_in
|
academic papers
malware analysts
threat intelligence teams
|
gptkbp:is_associated_with
|
identity theft
|
gptkbp:is_considered
|
a nuisance
a major threat
a legacy virus
a significant malware threat
|
gptkbp:is_discussed_in
|
cybersecurity reports
|
gptkbp:is_known_for
|
self-replication
exploit vulnerabilities
exfiltrate data
its payload delivery
spamming email addresses
|
gptkbp:is_linked_to
|
cybercrime activities
|
gptkbp:is_monitored_by
|
cybersecurity agencies
|
gptkbp:is_noted_for
|
its rapid spread
|
gptkbp:is_part_of
|
gptkb:Netsky_family
malware analysis tools
cybersecurity discussions
malware history
malware databases
computer security discussions
|
gptkbp:is_recognized_by
|
hash values
|
gptkbp:is_related_to
|
spam emails
|
gptkbp:is_used_in
|
cybersecurity training
|
gptkbp:platform
|
gptkb:operating_system
|
gptkbp:recognizes
|
gptkb:virus
|
gptkbp:replaced_by
|
files
antivirus removal tools
|
gptkbp:reports_to
|
news articles
security firms
cause financial losses
|
gptkbp:social_responsibility
|
computers
|
gptkbp:type
|
worm
|
gptkbp:uses
|
peer-to-peer networks
|
gptkbp:was_marked_by
|
security researchers
|
gptkbp:written_in
|
gptkb:language
|
gptkbp:bfsParent
|
gptkb:Netsky
|
gptkbp:bfsLayer
|
4
|