gptkbp:instanceOf
|
malware
|
gptkbp:abilities
|
remote access
data exfiltration
stealth operation
|
gptkbp:alsoKnownAs
|
gptkb:Agent.BTZ
gptkb:Turla
gptkb:Uroburos
|
gptkbp:analyzes
|
gptkb:Kaspersky_Lab
gptkb:National_Security_Agency_(NSA)
gptkb:US_Cybersecurity_and_Infrastructure_Security_Agency_(CISA)
gptkb:Symantec
|
gptkbp:category
|
gptkb:Advanced_Persistent_Threat_(APT)
cyber weapon
|
gptkbp:commanded
|
peer-to-peer network
|
gptkbp:detects
|
gptkb:security
|
gptkbp:developedBy
|
Russian state-sponsored actors
|
gptkbp:discoveredBy
|
2014
|
https://www.w3.org/2000/01/rdf-schema#label
|
Snake (malware)
|
gptkbp:notableEvent
|
compromised US government networks
used in global cyber espionage campaigns
|
gptkbp:operatingSystem
|
gptkb:Windows
gptkb:macOS
gptkb:Linux
|
gptkbp:persistenceMechanism
|
kernel-level rootkit
|
gptkbp:relatedTo
|
gptkb:Turla_group
|
gptkbp:removes
|
gptkb:Operation_MEDUSA
gptkb:FBI
international partners
|
gptkbp:target
|
research institutions
government organizations
diplomatic entities
military networks
|
gptkbp:type
|
cyber espionage tool
rootkit
|
gptkbp:uses
|
encrypted channels
custom communication protocols
|
gptkbp:writtenBy
|
gptkb:assembly_language
C
|
gptkbp:bfsParent
|
gptkb:Snake_campaign
|
gptkbp:bfsLayer
|
6
|