Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
Trojan |
gptkbp:canBeBypassedBy |
gptkb:security
firewalls |
gptkbp:category |
cybersecurity
|
gptkbp:controlledBy |
command and control server
|
gptkbp:countermeasures |
intrusion detection systems
software updates endpoint protection user education firewall configuration |
gptkbp:detects |
gptkb:security
network monitoring |
gptkbp:example |
gptkb:DarkComet
gptkb:NanoCore gptkb:Blackshades gptkb:njRAT gptkb:Poison_Ivy |
gptkbp:firstAppearance |
1990s
|
https://www.w3.org/2000/01/rdf-schema#label |
Remote Access Trojan (RAT)
|
gptkbp:impact |
identity theft
data exfiltration system compromise financial loss privacy breach |
gptkbp:purpose |
remote control of computers
|
gptkbp:relatedTo |
gptkb:keyboard
malware botnet rootkit |
gptkbp:riskFactor |
high
|
gptkbp:spreadTo |
malicious downloads
phishing emails social engineering software vulnerabilities |
gptkbp:target |
gptkb:Android
gptkb:Windows_operating_system gptkb:macOS gptkb:Linux |
gptkbp:usedFor |
espionage
surveillance file transfer data theft unauthorized access screen capture microphone access webcam access keylogging |
gptkbp:bfsParent |
gptkb:Trojan_Horse_(computing)
|
gptkbp:bfsLayer |
6
|