Statements (50)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:associated_with |
APT groups
|
gptkbp:available_at |
USB drives
drive-by downloads |
gptkbp:can_be_used_to |
peer-to-peer communication
steal credentials HTTP/ HTTPS protocols install other malware |
gptkbp:can_create |
backdoor access
|
gptkbp:can_detect |
gptkb:virus
|
gptkbp:can_download |
additional payloads
|
gptkbp:can_perform |
commands remotely
|
gptkbp:casualties |
government agencies
corporate networks |
gptkbp:controls |
files on infected systems
|
gptkbp:developed_by |
gptkb:Chinese_hackers
|
gptkbp:discovered_by |
gptkb:2012
|
gptkbp:distribution |
phishing emails
malicious websites |
gptkbp:has_ability |
gptkb:remote_control
data exfiltration screen capturing keylogging |
gptkbp:has_variants |
Plug X 2.0
Plug X 3.0 |
https://www.w3.org/2000/01/rdf-schema#label |
Plug X malware
|
gptkbp:is_analyzed_in |
cybersecurity researchers
|
gptkbp:is_associated_with |
data breaches
|
gptkbp:is_considered |
a significant threat
a sophisticated threat |
gptkbp:is_known_for |
stealth techniques
modular architecture command and control servers its persistence mechanisms |
gptkbp:is_monitored_by |
threat intelligence platforms
|
gptkbp:is_often_delivered_via |
social engineering tactics
|
gptkbp:is_part_of |
cyber espionage campaigns
advanced persistent threat (APT) operations |
gptkbp:is_related_to |
other RATs
|
gptkbp:is_used_in |
spear phishing attacks
|
gptkbp:prevention |
firewalls
endpoint protection solutions |
gptkbp:reported_by |
security advisories
|
gptkbp:targets |
gptkb:operating_system
|
gptkbp:type |
remote access Trojan
|
gptkbp:uses |
encryption
DLL injection |
gptkbp:written_in |
gptkb:C++
|
gptkbp:bfsParent |
gptkb:APT10
|
gptkbp:bfsLayer |
6
|