Trick Bot

GPTKB entity

Statements (64)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:Netsky_family_of_malware
gptkb:Agent_Nobelium
gptkbp:amended_by system settings
gptkbp:can_create botnets
gptkbp:delivers drive-by downloads
malvertising
gptkbp:developed_by Cybercriminals
gptkbp:distributes via phishing emails
gptkbp:distribution botnet infrastructure
gptkbp:exported_to malicious attachments
gptkbp:first_appearance gptkb:2016
gptkbp:has_ability credential harvesting
gptkbp:has_variants different versions
https://www.w3.org/2000/01/rdf-schema#label Trick Bot
gptkbp:is_accessible_by additional malware
gptkbp:is_aimed_at law enforcement agencies
gptkbp:is_associated_with Ransomware attacks
gptkbp:is_capable_of data
keylogging
gptkbp:is_considered a significant threat
a banking trojan
a major cybersecurity threat
a sophisticated threat
gptkbp:is_discussed_in cybersecurity forums
gptkbp:is_known_for exploit vulnerabilities
use social engineering tactics
banking trojans
exfiltrate sensitive data
its persistence mechanisms
target corporate networks
target individuals and organizations
target multiple countries
use obfuscation techniques
web injects
gptkbp:is_monitored_by security researchers
gptkbp:is_often_associated_with financial crimes
phishing campaigns
other malware types
gptkbp:is_often_used_in gptkb:Police_Department
financial fraud schemes
gptkbp:is_part_of gptkb:Detective
cybercrime ecosystem
gptkbp:is_protected_by gptkb:virus
gptkbp:is_used_for identity theft
create fake websites
distribute ransomware
launch D Do S attacks
steal banking credentials
gptkbp:is_used_in data breaches
gptkbp:operates gptkb:operating_system
gptkbp:primary_function stealing personal information
gptkbp:provides_access_to gptkb:Photographer
gptkbp:reports_to evade detection
have a global reach
have a command and control infrastructure
have a large user base
have a modular design
gptkbp:security_features gptkb:aircraft
gptkbp:targets gptkb:Educational_Institution
cryptocurrency wallets
gptkbp:updates malicious commands
gptkbp:uses modular architecture