rootkit

GPTKB entity

Statements (61)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:Netsky._Z
gptkbp:amended_by system behavior
system files
gptkbp:can_be commercial
open-source
persistent
network-based
used for data manipulation
used for espionage
used for system monitoring
used for sabotage
bootkit
commercial rootkits
fileless
kernel-level
open-source rootkits
rootkit for mobile devices
used for creating backdoors
used for credential harvesting
used for data destruction
used for data exfiltration
used for denial of service attacks
used for evading detection
used for financial fraud
used for identity theft
used for information gathering
used for keylogging
used for maintaining access
used for malware distribution
used for network scanning
used for network traffic interception
used for phishing attacks
used for privilege escalation
used for ransomware deployment
used for social engineering attacks
used for surveillance.
used for system integrity violations
used for system manipulation
used for system performance degradation
used for system takeover
used for unauthorized access
used for vulnerability exploitation
user-mode
gptkbp:can_provide remote access
gptkbp:caused_by data breaches
gptkbp:difficulty detect
https://www.w3.org/2000/01/rdf-schema#label rootkit
gptkbp:installation exploits
gptkbp:is_a security threat
type of malware
gptkbp:is_often_associated_with gptkb:Trojans
gptkbp:is_often_used_in gptkb:Police_Department
advanced persistent threats
gptkbp:is_related_to gptkb:virus
gptkbp:is_used_for steal credentials
hiding malicious software
gptkbp:is_used_in gptkb:Detective
gptkbp:recognizes gptkb:virus
gptkbp:social_responsibility operating systems