Statements (26)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
|
gptkbp:abilities |
data exfiltration
command and control communication keylogging |
gptkbp:associatedWith |
gptkb:Chinese_threat_actors
|
gptkbp:controlProtocol |
gptkb:HTTP
HTTPS custom protocols |
gptkbp:deliveredBy |
malicious attachments
spear phishing emails |
gptkbp:discoveredBy |
2006
|
gptkbp:exploits |
gptkb:Internet_Explorer
gptkb:Adobe_Reader Zero-day vulnerabilities |
https://www.w3.org/2000/01/rdf-schema#label |
Sykipot malware
|
gptkbp:notable_campaign |
attacks against US defense contractors
|
gptkbp:notableFeature |
smart card credential theft
|
gptkbp:platform |
gptkb:Microsoft_Windows
|
gptkbp:remedy |
network monitoring
antivirus detection patching vulnerabilities |
gptkbp:type |
trojan
|
gptkbp:usedBy |
APT groups
|
gptkbp:usedFor |
cybercrime
|
gptkbp:bfsParent |
gptkb:Operation_Sykipot
|
gptkbp:bfsLayer |
7
|