Statements (59)
Predicate | Object |
---|---|
gptkbp:instanceOf |
computer worm
|
gptkbp:canBe |
network congestion
data loss system slowdown |
gptkbp:createdBy |
Ben_Edelman
|
gptkbp:distributes |
malware
|
gptkbp:firstAppearance |
2004
|
gptkbp:hasImpactOn |
business operations
computer security internet traffic |
gptkbp:hasVariants |
gptkb:Netsky.I
Netsky.A Netsky.B Netsky.C Netsky.D Netsky.E Netsky.F Netsky.G Netsky.H Netsky.J |
https://www.w3.org/2000/01/rdf-schema#label |
Netsky family of worms
|
gptkbp:isAssociatedWith |
data breaches
phishing attacks identity theft financial fraud spam campaigns |
gptkbp:isAttendedBy |
cybersecurity firms
malware analysts |
gptkbp:isConsidered |
a significant threat
a legacy threat |
gptkbp:isDistributedBy |
file sharing networks
infected email attachments |
gptkbp:isDocumentedIn |
security bulletins
|
gptkbp:isExaminedBy |
security patches
firewalls user education malware removal tools |
gptkbp:isFiledIn |
C programming language
|
gptkbp:isKnownFor |
exploiting vulnerabilities
spreading rapidly using peer-to-peer networks |
gptkbp:isLocatedIn |
cybersecurity literature
|
gptkbp:isMaintainedBy |
signatures
hash values |
gptkbp:isPartOf |
malware family
cybercrime history |
gptkbp:isPortrayedBy |
security advisories
security researchers |
gptkbp:isProtectedBy |
antivirus software
|
gptkbp:isRelatedTo |
gptkb:Sasser_worm
|
gptkbp:isStudiedIn |
cybersecurity courses
|
gptkbp:isTrainedIn |
threat intelligence platforms
antivirus vendors |
gptkbp:isUsedIn |
cyber espionage
cyber warfare hacktivism |
gptkbp:targets |
gptkb:Microsoft_Windows
|
gptkbp:uses |
files
email as a propagation method |