|
gptkbp:instanceOf
|
gptkb:malware
|
|
gptkbp:abilities
|
remote access
data exfiltration
stealth operation
|
|
gptkbp:alsoKnownAs
|
gptkb:Agent.BTZ
gptkb:Turla
gptkb:Uroburos
|
|
gptkbp:analyzes
|
gptkb:Kaspersky_Lab
gptkb:National_Security_Agency_(NSA)
gptkb:US_Cybersecurity_and_Infrastructure_Security_Agency_(CISA)
gptkb:Symantec
|
|
gptkbp:category
|
gptkb:Advanced_Persistent_Threat_(APT)
cyber weapon
|
|
gptkbp:commanded
|
gptkb:peer-to-peer_network
|
|
gptkbp:detects
|
gptkb:security
|
|
gptkbp:developedBy
|
Russian state-sponsored actors
|
|
gptkbp:discoveredBy
|
2014
|
|
gptkbp:notableEvent
|
compromised US government networks
used in global cyber espionage campaigns
|
|
gptkbp:operatingSystem
|
gptkb:Windows
gptkb:macOS
gptkb:Linux
|
|
gptkbp:persistenceMechanism
|
kernel-level rootkit
|
|
gptkbp:relatedTo
|
gptkb:Turla_group
|
|
gptkbp:removes
|
gptkb:Operation_MEDUSA
gptkb:FBI
international partners
|
|
gptkbp:target
|
research institutions
government organizations
diplomatic entities
military networks
|
|
gptkbp:type
|
gptkb:cyber_espionage_tool
gptkb:rootkit
|
|
gptkbp:uses
|
encrypted channels
custom communication protocols
|
|
gptkbp:writtenBy
|
gptkb:assembly_language
C
|
|
gptkbp:bfsParent
|
gptkb:Snake_campaign
|
|
gptkbp:bfsLayer
|
6
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Snake (malware)
|