Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Netsky_family_of_malware
gptkb:Agent_Nobelium |
gptkbp:amended_by |
system settings
|
gptkbp:can_create |
botnets
|
gptkbp:delivers |
drive-by downloads
malvertising |
gptkbp:developed_by |
Cybercriminals
|
gptkbp:distributes |
via phishing emails
|
gptkbp:distribution |
botnet infrastructure
|
gptkbp:exported_to |
malicious attachments
|
gptkbp:first_appearance |
gptkb:2016
|
gptkbp:has_ability |
credential harvesting
|
gptkbp:has_variants |
different versions
|
https://www.w3.org/2000/01/rdf-schema#label |
Trick Bot
|
gptkbp:is_accessible_by |
additional malware
|
gptkbp:is_aimed_at |
law enforcement agencies
|
gptkbp:is_associated_with |
Ransomware attacks
|
gptkbp:is_capable_of |
data
keylogging |
gptkbp:is_considered |
a significant threat
a banking trojan a major cybersecurity threat a sophisticated threat |
gptkbp:is_discussed_in |
cybersecurity forums
|
gptkbp:is_known_for |
exploit vulnerabilities
use social engineering tactics banking trojans exfiltrate sensitive data its persistence mechanisms target corporate networks target individuals and organizations target multiple countries use obfuscation techniques web injects |
gptkbp:is_monitored_by |
security researchers
|
gptkbp:is_often_associated_with |
financial crimes
phishing campaigns other malware types |
gptkbp:is_often_used_in |
gptkb:Police_Department
financial fraud schemes |
gptkbp:is_part_of |
gptkb:Detective
cybercrime ecosystem |
gptkbp:is_protected_by |
gptkb:virus
|
gptkbp:is_used_for |
identity theft
create fake websites distribute ransomware launch D Do S attacks steal banking credentials |
gptkbp:is_used_in |
data breaches
|
gptkbp:operates |
gptkb:operating_system
|
gptkbp:primary_function |
stealing personal information
|
gptkbp:provides_access_to |
gptkb:Photographer
|
gptkbp:reports_to |
evade detection
have a global reach have a command and control infrastructure have a large user base have a modular design |
gptkbp:security_features |
gptkb:aircraft
|
gptkbp:targets |
gptkb:Educational_Institution
cryptocurrency wallets |
gptkbp:updates |
malicious commands
|
gptkbp:uses |
modular architecture
|