Statements (61)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Netsky._Z
|
gptkbp:amended_by |
system behavior
system files |
gptkbp:can_be |
commercial
open-source persistent network-based used for data manipulation used for espionage used for system monitoring used for sabotage bootkit commercial rootkits fileless kernel-level open-source rootkits rootkit for mobile devices used for creating backdoors used for credential harvesting used for data destruction used for data exfiltration used for denial of service attacks used for evading detection used for financial fraud used for identity theft used for information gathering used for keylogging used for maintaining access used for malware distribution used for network scanning used for network traffic interception used for phishing attacks used for privilege escalation used for ransomware deployment used for social engineering attacks used for surveillance. used for system integrity violations used for system manipulation used for system performance degradation used for system takeover used for unauthorized access used for vulnerability exploitation user-mode |
gptkbp:can_provide |
remote access
|
gptkbp:caused_by |
data breaches
|
gptkbp:difficulty |
detect
|
https://www.w3.org/2000/01/rdf-schema#label |
rootkit
|
gptkbp:installation |
exploits
|
gptkbp:is_a |
security threat
type of malware |
gptkbp:is_often_associated_with |
gptkb:Trojans
|
gptkbp:is_often_used_in |
gptkb:Police_Department
advanced persistent threats |
gptkbp:is_related_to |
gptkb:virus
|
gptkbp:is_used_for |
steal credentials
hiding malicious software |
gptkbp:is_used_in |
gptkb:Detective
|
gptkbp:recognizes |
gptkb:virus
|
gptkbp:social_responsibility |
operating systems
|