Statements (61)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:amended_by |
system behavior
system files |
gptkbp:can_be |
commercial
open-source persistent network-based used for data manipulation used for espionage used for system monitoring used for sabotage bootkit commercial rootkits fileless kernel-level open-source rootkits rootkit for mobile devices used for creating backdoors used for credential harvesting used for data destruction used for data exfiltration used for denial of service attacks used for evading detection used for financial fraud used for identity theft used for information gathering used for keylogging used for maintaining access used for malware distribution used for network scanning used for network traffic interception used for phishing attacks used for privilege escalation used for ransomware deployment used for social engineering attacks used for surveillance. used for system integrity violations used for system manipulation used for system performance degradation used for system takeover used for unauthorized access used for vulnerability exploitation user-mode |
gptkbp:can_be_used_in |
gptkb:Espionage
|
gptkbp:can_be_used_to |
steal credentials
|
gptkbp:can_cause |
data breaches
|
gptkbp:can_detect |
gptkb:virus
|
gptkbp:can_provide |
remote access
|
gptkbp:diseases |
operating systems
|
https://www.w3.org/2000/01/rdf-schema#label |
rootkit
|
gptkbp:installation |
exploits
|
gptkbp:is_a |
security threat
type of malware |
gptkbp:is_difficult_to |
detect
|
gptkbp:is_often_associated_with |
gptkb:Trojans
|
gptkbp:is_often_used_in |
gptkb:Espionage
advanced persistent threats |
gptkbp:is_related_to |
gptkb:virus
|
gptkbp:is_used_for |
hiding malicious software
|
gptkbp:bfsParent |
gptkb:Netsky._Z
|
gptkbp:bfsLayer |
6
|