Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:malware
|
| gptkbp:category |
gptkb:Trojan
gptkb:exploit |
| gptkbp:detects |
gptkb:security
|
| gptkbp:distribution |
malicious websites
phishing emails |
| gptkbp:effect |
steal information
download additional malware install backdoors |
| gptkbp:method |
disguised as legitimate software
|
| gptkbp:purpose |
unauthorized access
system compromise |
| gptkbp:riskFactor |
high
|
| gptkbp:target |
gptkb:Linux_systems
Windows systems macOS systems |
| https://www.w3.org/2000/01/rdf-schema#label |
exploit Trojan
|