Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
Trojan |
gptkbp:canBe |
espionage
cybercriminals data exfiltration credential theft insiders hacktivists ransomware deployment botnet creation state-sponsored hackers |
gptkbp:canBeBypassedBy |
gptkb:security
firewalls |
gptkbp:category |
cybersecurity
|
gptkbp:controlledBy |
command and control server
|
gptkbp:countermeasures |
multi-factor authentication
patch management network segmentation user education firewall configuration antivirus updates |
gptkbp:deliveredBy |
malicious downloads
phishing emails malicious attachments exploit kits |
gptkbp:detects |
gptkb:security
network monitoring endpoint detection and response |
gptkbp:firstAppearance |
1990s
|
https://www.w3.org/2000/01/rdf-schema#label |
remote access Trojan (RAT)
|
gptkbp:notableExample |
gptkb:DarkComet
gptkb:Blackshades gptkb:njRAT gptkb:Poison_Ivy gptkb:Back_Orifice Sub7 |
gptkbp:purpose |
remote control of infected computers
|
gptkbp:target |
gptkb:Android
gptkb:Windows_operating_system gptkb:macOS gptkb:Linux |
gptkbp:usedFor |
surveillance
file transfer data theft spying unauthorized access screen capture microphone access webcam access keylogging |
gptkbp:bfsParent |
gptkb:Trojan_(software)
|
gptkbp:bfsLayer |
6
|