gptkbp:instanceOf
|
malware
|
gptkbp:alsoKnownAs
|
Trojan
|
gptkbp:category
|
computer security
cybercrime
malicious software
|
gptkbp:countermeasures
|
gptkb:security
firewalls
software updates
user education
|
gptkbp:differenceFromVirus
|
does not self-replicate
|
gptkbp:differenceFromWorm
|
does not spread automatically
|
gptkbp:doesNotSelfReplicate
|
true
|
gptkbp:effect
|
gptkb:remote_control
data exfiltration
credential theft
system compromise
keylogging
botnet recruitment
ransomware installation
|
gptkbp:firstDescribed
|
1970s
|
https://www.w3.org/2000/01/rdf-schema#label
|
Trojan (software)
|
gptkbp:infects
|
phishing
social engineering
malicious email attachments
fake software downloads
|
gptkbp:nameOrigin
|
Trojan Horse from Greek mythology
|
gptkbp:notableExample
|
gptkb:NanoCore
gptkb:Dridex
gptkb:Zeus
gptkb:Emotet
gptkb:QakBot
gptkb:TrickBot
gptkb:Agent_Tesla
gptkb:Back_Orifice
gptkb:PoisonIvy
gptkb:SpyEye
|
gptkbp:purpose
|
data theft
spying
system damage
unauthorized access
installing other malware
|
gptkbp:target
|
gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
|
gptkbp:type
|
gptkb:banking_Trojan
gptkb:exploit_Trojan
gptkb:remote_access_Trojan_(RAT)
gptkb:spyware_Trojan
backdoor
rootkit
dropper
|
gptkbp:bfsParent
|
gptkb:Trojan
|
gptkbp:bfsLayer
|
5
|