Trojans

GPTKB entity

Statements (56)
Predicate Object
gptkbp:instanceOf malware
gptkbp:alsoKnownAs Trojan
gptkbp:canAllow gptkb:remote_control
botnet participation
gptkbp:canBe gptkb:fraud
espionage
creating botnets
data exfiltration
ransomware attacks
spying
system sabotage
gptkbp:canBeBypassedBy user authentication
security controls
gptkbp:canBeDeployedOn malware
backdoors
keyloggers
gptkbp:canBeDisabled gptkb:security
firewalls
gptkbp:canBeDistributedVia peer-to-peer networks
email attachments
malicious websites
social engineering
gptkbp:canDelete files
gptkbp:canDownload additional malware
gptkbp:canSteal banking information
passwords
personal data
gptkbp:category computer security
gptkbp:commonTargets gptkb:Android
gptkb:macOS
gptkb:Windows_OS
gptkb:Linux
gptkbp:corruptedBy data
gptkbp:detects gptkb:security
anti-malware tools
gptkbp:differenceFromVirus does not self-replicate
gptkbp:differenceFromWorm does not spread automatically
gptkbp:doesNotSelfReplicate true
gptkbp:firstAppearance 1980s
https://www.w3.org/2000/01/rdf-schema#label Trojans
gptkbp:infects disguised as legitimate software
malicious downloads
phishing emails
gptkbp:namedAfter Trojan Horse from Greek mythology
gptkbp:notableRelease system files
gptkbp:prevention firewalls
email filtering
safe browsing practices
up-to-date software
gptkbp:purpose data theft
system damage
unauthorized access
gptkbp:removes gptkb:security
manual removal
gptkbp:bfsParent gptkb:University_of_Southern_California
gptkbp:bfsLayer 4