gptkbp:instance_of
|
gptkb:virus
|
gptkbp:bfsLayer
|
4
|
gptkbp:bfsParent
|
gptkb:Eternal_Blue
|
gptkbp:casualties
|
gptkb:Merck
gptkb:Maersk
gptkb:Ukrainian_government
gptkb:WPP_plc
gptkb:Fed_Ex
|
gptkbp:challenges
|
logistics companies
telecommunications sector
manufacturing sector
transportation sector
healthcare sector
global shipping
pharmaceutical supply chain
Ukrainian media
Ukrainian power grid
Ukrainian banks
|
gptkbp:character_appearance
|
gptkb:virus
|
gptkbp:controls
|
C2 servers
|
gptkbp:developed_by
|
gptkb:Sandworm_Team
|
gptkbp:exported_to
|
exploiting vulnerabilities
|
gptkbp:first_appearance
|
June 2017
|
gptkbp:first_introduced
|
randomized
|
https://www.w3.org/2000/01/rdf-schema#label
|
Not Petya malware
|
gptkbp:impact
|
financial losses
data loss
operational disruption
|
gptkbp:involved_countries
|
gptkb:government_agency
gptkb:India
gptkb:Monarch
gptkb:Russia
gptkb:Ukraine
gptkb:United_Kingdom
gptkb:United_States
|
gptkbp:is_vulnerable_to
|
gptkb:Eternal_Blue
Eternal Romance
M S17-010
|
gptkbp:operating_system
|
gptkb:Microsoft_Windows
|
gptkbp:primary_source
|
data destruction
|
gptkbp:propagation_method
|
gptkb:robot
network shares
|
gptkbp:related_to
|
gptkb:Wanna_Cry
cyber warfare
state-sponsored attacks
|
gptkbp:responds_to
|
incident response
network segmentation
cybersecurity measures
patching vulnerabilities
backup strategies
|
gptkbp:seating_capacity
|
disk encryption
|
gptkbp:security_features
|
gptkb:RSA
gptkb:AES
|
gptkbp:signature_move
|
gptkb:virus
gptkb:Symantec
gptkb:ESET
|
gptkbp:type
|
gptkb:virus
|