Statements (59)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
|
gptkbp:acceptsPaymentMethod |
gptkb:Bitcoin
gptkb:cryptocurrency |
gptkbp:affects |
computers
mobile devices networks |
gptkbp:alternativeName |
malware_family
Malware Ransomware adware banking_trojan computer_worm malware_module ransomware spyware |
gptkbp:category |
cybercrime
|
gptkbp:countermeasures |
gptkb:security
multi-factor authentication patch management backups network segmentation user education |
gptkbp:detects |
network monitoring
heuristic analysis signature-based detection behavioral analysis |
gptkbp:encryption |
user files
|
gptkbp:firstAppearance |
late 1980s
|
gptkbp:impact |
legal consequences
data loss financial loss reputational damage operational disruption |
gptkbp:notableExample |
gptkb:Petya
gptkb:Ryuk gptkb:Locky gptkb:WannaCry gptkb:cave gptkb:Conti gptkb:DarkSide gptkb:REvil gptkb:CryptoLocker |
gptkbp:relatedTo |
gptkb:cryptovirology
malware Trojan cyber extortion |
gptkbp:requires |
ransom payment
|
gptkbp:spreadTo |
phishing emails
malicious attachments remote desktop software exploit kits malvertising |
gptkbp:target |
individuals
businesses governments healthcare organizations critical infrastructure |
gptkbp:bfsParent |
gptkb:World_Wide_Web
|
gptkbp:bfsLayer |
3
|