rootkit

GPTKB entity

Statements (61)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:amended_by system behavior
system files
gptkbp:can_be commercial
open-source
persistent
network-based
used for data manipulation
used for espionage
used for system monitoring
used for sabotage
bootkit
commercial rootkits
fileless
kernel-level
open-source rootkits
rootkit for mobile devices
used for creating backdoors
used for credential harvesting
used for data destruction
used for data exfiltration
used for denial of service attacks
used for evading detection
used for financial fraud
used for identity theft
used for information gathering
used for keylogging
used for maintaining access
used for malware distribution
used for network scanning
used for network traffic interception
used for phishing attacks
used for privilege escalation
used for ransomware deployment
used for social engineering attacks
used for surveillance.
used for system integrity violations
used for system manipulation
used for system performance degradation
used for system takeover
used for unauthorized access
used for vulnerability exploitation
user-mode
gptkbp:can_be_used_in gptkb:Espionage
gptkbp:can_be_used_to steal credentials
gptkbp:can_cause data breaches
gptkbp:can_detect gptkb:virus
gptkbp:can_provide remote access
gptkbp:diseases operating systems
https://www.w3.org/2000/01/rdf-schema#label rootkit
gptkbp:installation exploits
gptkbp:is_a security threat
type of malware
gptkbp:is_difficult_to detect
gptkbp:is_often_associated_with gptkb:Trojans
gptkbp:is_often_used_in gptkb:Espionage
advanced persistent threats
gptkbp:is_related_to gptkb:virus
gptkbp:is_used_for hiding malicious software
gptkbp:bfsParent gptkb:Netsky._Z
gptkbp:bfsLayer 6