|
gptkbp:instanceOf
|
gptkb:malware
|
|
gptkbp:alsoKnownAs
|
gptkb:Trojan
|
|
gptkbp:category
|
gptkb:cybercrime
computer security
malicious software
|
|
gptkbp:commonPayloads
|
gptkb:keyboard
gptkb:malware
backdoor
|
|
gptkbp:detects
|
gptkb:security
behavior analysis
|
|
gptkbp:differenceFromVirus
|
does not self-replicate
|
|
gptkbp:differenceFromWorm
|
does not spread automatically
|
|
gptkbp:distributedBy
|
social engineering
malicious website
email attachment
software download
|
|
gptkbp:doesNotSelfReplicate
|
true
|
|
gptkbp:effect
|
data theft
system compromise
financial loss
privacy breach
|
|
gptkbp:example
|
gptkb:Dridex
gptkb:Emotet
gptkb:Remote_Access_Trojan_(RAT)
gptkb:Zeus_Trojan
|
|
gptkbp:firstDescribed
|
1970s
|
|
gptkbp:namedAfter
|
gptkb:Trojan_Horse_(mythology)
|
|
gptkbp:prevention
|
user education
do not open suspicious attachments
enable firewalls
keep software updated
use antivirus software
|
|
gptkbp:purpose
|
deceive users
gain unauthorized access
install additional malware
steal information
|
|
gptkbp:relatedConcept
|
gptkb:malware
gptkb:rootkit
virus (computing)
worm (computing)
|
|
gptkbp:removes
|
gptkb:security
manual removal
|
|
gptkbp:requiresUserAction
|
true
|
|
gptkbp:target
|
gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Trojan Horse (computing)
|