Statements (50)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Trojan
gptkb:malware |
| gptkbp:canBe |
espionage
cybercriminals data exfiltration credential theft insiders hacktivists ransomware deployment botnet creation state-sponsored hackers |
| gptkbp:canBeBypassedBy |
gptkb:security
firewalls |
| gptkbp:category |
cybersecurity
|
| gptkbp:controlledBy |
command and control server
|
| gptkbp:countermeasures |
multi-factor authentication
patch management network segmentation user education firewall configuration antivirus updates |
| gptkbp:deliveredBy |
malicious downloads
phishing emails malicious attachments exploit kits |
| gptkbp:detects |
gptkb:security
network monitoring endpoint detection and response |
| gptkbp:firstAppearance |
1990s
|
| gptkbp:notableExample |
gptkb:DarkComet
gptkb:Blackshades gptkb:njRAT gptkb:Poison_Ivy gptkb:Back_Orifice Sub7 |
| gptkbp:purpose |
remote control of infected computers
|
| gptkbp:target |
gptkb:Android
gptkb:Windows_operating_system gptkb:macOS gptkb:Linux |
| gptkbp:usedFor |
surveillance
file transfer data theft spying unauthorized access screen capture microphone access webcam access keylogging |
| https://www.w3.org/2000/01/rdf-schema#label |
remote access Trojan (RAT)
|