Netsky family of worms

GPTKB entity

Statements (59)
Predicate Object
gptkbp:instanceOf computer worm
gptkbp:canBe network congestion
data loss
system slowdown
gptkbp:createdBy Ben_Edelman
gptkbp:distributes malware
gptkbp:firstAppearance 2004
gptkbp:hasImpactOn business operations
computer security
internet traffic
gptkbp:hasVariants gptkb:Netsky.I
Netsky.A
Netsky.B
Netsky.C
Netsky.D
Netsky.E
Netsky.F
Netsky.G
Netsky.H
Netsky.J
https://www.w3.org/2000/01/rdf-schema#label Netsky family of worms
gptkbp:isAssociatedWith data breaches
phishing attacks
identity theft
financial fraud
spam campaigns
gptkbp:isAttendedBy cybersecurity firms
malware analysts
gptkbp:isConsidered a significant threat
a legacy threat
gptkbp:isDistributedBy file sharing networks
infected email attachments
gptkbp:isDocumentedIn security bulletins
gptkbp:isExaminedBy security patches
firewalls
user education
malware removal tools
gptkbp:isFiledIn C programming language
gptkbp:isKnownFor exploiting vulnerabilities
spreading rapidly
using peer-to-peer networks
gptkbp:isLocatedIn cybersecurity literature
gptkbp:isMaintainedBy signatures
hash values
gptkbp:isPartOf malware family
cybercrime history
gptkbp:isPortrayedBy security advisories
security researchers
gptkbp:isProtectedBy antivirus software
gptkbp:isRelatedTo gptkb:Sasser_worm
gptkbp:isStudiedIn cybersecurity courses
gptkbp:isTrainedIn threat intelligence platforms
antivirus vendors
gptkbp:isUsedIn cyber espionage
cyber warfare
hacktivism
gptkbp:targets gptkb:Microsoft_Windows
gptkbp:uses files
email as a propagation method