Statements (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
|
gptkbp:alsoKnownAs |
Trojan
|
gptkbp:canAllow |
gptkb:remote_control
botnet participation |
gptkbp:canBe |
gptkb:fraud
espionage creating botnets data exfiltration ransomware attacks spying system sabotage |
gptkbp:canBeBypassedBy |
user authentication
security controls |
gptkbp:canBeDeployedOn |
malware
backdoors keyloggers |
gptkbp:canBeDisabled |
gptkb:security
firewalls |
gptkbp:canBeDistributedVia |
peer-to-peer networks
email attachments malicious websites social engineering |
gptkbp:canDelete |
files
|
gptkbp:canDownload |
additional malware
|
gptkbp:canSteal |
banking information
passwords personal data |
gptkbp:category |
computer security
|
gptkbp:commonTargets |
gptkb:Android
gptkb:macOS gptkb:Windows_OS gptkb:Linux |
gptkbp:corruptedBy |
data
|
gptkbp:detects |
gptkb:security
anti-malware tools |
gptkbp:differenceFromVirus |
does not self-replicate
|
gptkbp:differenceFromWorm |
does not spread automatically
|
gptkbp:doesNotSelfReplicate |
true
|
gptkbp:firstAppearance |
1980s
|
https://www.w3.org/2000/01/rdf-schema#label |
Trojans
|
gptkbp:infects |
disguised as legitimate software
malicious downloads phishing emails |
gptkbp:namedAfter |
Trojan Horse from Greek mythology
|
gptkbp:notableRelease |
system files
|
gptkbp:prevention |
firewalls
email filtering safe browsing practices up-to-date software |
gptkbp:purpose |
data theft
system damage unauthorized access |
gptkbp:removes |
gptkb:security
manual removal |
gptkbp:bfsParent |
gptkb:University_of_Southern_California
|
gptkbp:bfsLayer |
4
|