Statements (39)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Remote_Access_Trojan
|
| gptkbp:category |
gptkb:Trojan
Cybercrime tool Spyware |
| gptkbp:controls |
Command and Control server
|
| gptkbp:detects |
Antivirus software
|
| gptkbp:developedBy |
gptkb:Breaking_Security
|
| gptkbp:distributedBy |
Exploit kits
Malicious attachments Phishing emails |
| gptkbp:features |
Audio recording
Bypass User Account Control File management Keylogger Password stealing Persistence mechanisms Process management Remote shell Screen capture Webcam access |
| gptkbp:firstAppearance |
2016
|
| gptkbp:legalStatus |
Illegal if used for unauthorized access
|
| gptkbp:malicious |
Yes
|
| gptkbp:notable_campaign |
COVID-19 themed phishing
Financial sector attacks Targeted attacks on government organizations |
| gptkbp:platform |
gptkb:Windows
|
| gptkbp:priceRange |
Varies
|
| gptkbp:sells |
Commercial software
|
| gptkbp:type |
gptkb:malware
|
| gptkbp:usedFor |
gptkb:Surveillance
Data exfiltration Credential theft Keylogging Remote control of infected computers |
| gptkbp:website |
https://breakingsecurity.net/remcos/
|
| gptkbp:bfsParent |
gptkb:TA-90
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Remcos RAT
|