Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:access |
gptkb:camera
|
gptkbp:amended_by |
system settings
|
gptkbp:available_at |
drive-by downloads
malvertising |
gptkbp:can_be_used_for |
identity theft
|
gptkbp:can_be_used_to |
create fake websites
distribute ransomware steal banking credentials launch DDo S attacks |
gptkbp:can_create |
botnets
|
gptkbp:can_exfiltrate |
data
|
gptkbp:developed_by |
Cybercriminals
|
gptkbp:distributes |
via phishing emails
|
gptkbp:first_appearance |
gptkb:2016
|
gptkbp:has_ability |
credential harvesting
|
gptkbp:has_variants |
different versions
|
https://www.w3.org/2000/01/rdf-schema#label |
Trick Bot
|
gptkbp:is_accessible_by |
additional malware
|
gptkbp:is_associated_with |
Ransomware attacks
|
gptkbp:is_capable_of |
keylogging
|
gptkbp:is_considered |
a significant threat
a banking trojan a major cybersecurity threat a sophisticated threat |
gptkbp:is_distributed_by |
botnet infrastructure
|
gptkbp:is_known_for |
banking trojans
its persistence mechanisms |
gptkbp:is_known_to |
exploit vulnerabilities
use social engineering tactics exfiltrate sensitive data target corporate networks target individuals and organizations target multiple countries use obfuscation techniques web injects |
gptkbp:is_monitored_by |
security researchers
|
gptkbp:is_often_accompanied_by |
other malware types
|
gptkbp:is_often_associated_with |
phishing campaigns
|
gptkbp:is_often_discussed_in |
cybersecurity forums
|
gptkbp:is_often_involved_in |
financial crimes
|
gptkbp:is_often_used_in |
gptkb:Espionage
financial fraud schemes |
gptkbp:is_part_of |
gptkb:Espionage
cybercrime ecosystem |
gptkbp:is_targeted_at |
law enforcement agencies
|
gptkbp:is_updated_by |
malicious commands
|
gptkbp:is_used_in |
data breaches
|
gptkbp:operates |
gptkb:operating_system
|
gptkbp:prevention |
gptkb:virus
|
gptkbp:primary_function |
stealing personal information
|
gptkbp:reported_by |
evade detection
have a global reach have a command and control infrastructure have a large user base have a modular design |
gptkbp:spread_to |
malicious attachments
|
gptkbp:targets |
gptkb:financial_institutions
cryptocurrency wallets |
gptkbp:uses |
modular architecture
|
gptkbp:uses_encryption_for |
gptkb:communication
|
gptkbp:bfsParent |
gptkb:Netsky_family_of_malware
gptkb:Agent_Nobelium |
gptkbp:bfsLayer |
7
|