Netsky. Q

GPTKB entity

Statements (55)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:affects gptkb:operating_system
gptkbp:amended_by system files
gptkbp:block firewalls
gptkbp:can_create backdoors
gptkbp:can_lead_to financial loss
identity theft
gptkbp:caused_by data loss
gptkbp:created_by gptkb:unknown
gptkbp:distribution file-sharing networks
gptkbp:enables gptkb:virus
gptkbp:exported_to email attachments
gptkbp:has_variants gptkb:Netsky._A
gptkb:Netsky._B
gptkb:Netsky._C
gptkb:Netsky._D
gptkb:Netsky._E
gptkb:Netsky._F
gptkb:Netsky._G
gptkb:Netsky._H
gptkb:Netsky._I
gptkb:Netsky._J
https://www.w3.org/2000/01/rdf-schema#label Netsky. Q
gptkbp:is_aimed_at businesses
individual users
gptkbp:is_analyzed_in cybersecurity firms
malware analysis labs
gptkbp:is_associated_with cybercrime activities
gptkbp:is_considered gptkb:virus
a significant threat
gptkbp:is_discussed_in online forums
cybersecurity reports
gptkbp:is_known_for spreading rapidly
its ability to replicate
its polymorphic nature
gptkbp:is_monitored_by threat intelligence services
antivirus vendors
gptkbp:is_part_of gptkb:Netsky_family
cybersecurity awareness discussions
malware ecosystem
gptkbp:is_recognized_by hash values
gptkbp:is_related_to gptkb:Netsky_family_of_viruses
gptkbp:is_studied_in computer science courses
gptkbp:is_used_for a case study
gptkbp:receives spam emails
gptkbp:recognizes antivirus programs
gptkbp:replaced_by malware removal tools
gptkbp:reports_to security researchers
security bulletins
gptkbp:sensor gptkb:2004
gptkbp:type worm
gptkbp:uses peer-to-peer networks
gptkbp:written_in gptkb:language
gptkbp:bfsParent gptkb:Netsky
gptkbp:bfsLayer 4