Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q15122248> ?p ?o }
Showing triples 1 to 60 of
60
with 100 triples per page.
- Q15122248 subject Q20927260.
- Q15122248 subject Q7144561.
- Q15122248 subject Q7210623.
- Q15122248 subject Q8203762.
- Q15122248 subject Q8302598.
- Q15122248 abstract "CryptoLocker is a ransomware trojan which targeted computers running Microsoft Windows, believed to have first been posted to the Internet on 5 September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin.Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered infeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.CryptoLocker was isolated in late-May 2014 via Operation Tovar—which took down the Gameover ZeuS botnet that had been used to distribute the malware. During the operation, a security firm involved in the process obtained the database of private keys used by CryptoLocker, which was in turn used to build an online tool for recovering the keys and files without paying the ransom. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. Other instances of encryption-based ransomware that have followed have used the "CryptoLocker" name (or variations), but are otherwise unrelated.".
- Q15122248 wikiPageWikiLink Q1072840.
- Q15122248 wikiPageWikiLink Q109931.
- Q15122248 wikiPageWikiLink Q11189.
- Q15122248 wikiPageWikiLink Q11255.
- Q15122248 wikiPageWikiLink Q1142936.
- Q15122248 wikiPageWikiLink Q131723.
- Q15122248 wikiPageWikiLink Q133862.
- Q15122248 wikiPageWikiLink Q136218.
- Q15122248 wikiPageWikiLink Q1406.
- Q15122248 wikiPageWikiLink Q141090.
- Q15122248 wikiPageWikiLink Q1414572.
- Q15122248 wikiPageWikiLink Q1424639.
- Q15122248 wikiPageWikiLink Q14639.
- Q15122248 wikiPageWikiLink Q1516684.
- Q15122248 wikiPageWikiLink Q1553390.
- Q15122248 wikiPageWikiLink Q16975278.
- Q15122248 wikiPageWikiLink Q180634.
- Q15122248 wikiPageWikiLink Q181551.
- Q15122248 wikiPageWikiLink Q18204794.
- Q15122248 wikiPageWikiLink Q18357719.
- Q15122248 wikiPageWikiLink Q184473.
- Q15122248 wikiPageWikiLink Q186157.
- Q15122248 wikiPageWikiLink Q1934568.
- Q15122248 wikiPageWikiLink Q194274.
- Q15122248 wikiPageWikiLink Q201339.
- Q15122248 wikiPageWikiLink Q20927260.
- Q15122248 wikiPageWikiLink Q2457578.
- Q15122248 wikiPageWikiLink Q2474332.
- Q15122248 wikiPageWikiLink Q317671.
- Q15122248 wikiPageWikiLink Q329525.
- Q15122248 wikiPageWikiLink Q3506050.
- Q15122248 wikiPageWikiLink Q3922639.
- Q15122248 wikiPageWikiLink Q42332.
- Q15122248 wikiPageWikiLink Q463244.
- Q15122248 wikiPageWikiLink Q484598.
- Q15122248 wikiPageWikiLink Q4916.
- Q15122248 wikiPageWikiLink Q4917.
- Q15122248 wikiPageWikiLink Q5307935.
- Q15122248 wikiPageWikiLink Q599809.
- Q15122248 wikiPageWikiLink Q66221.
- Q15122248 wikiPageWikiLink Q677085.
- Q15122248 wikiPageWikiLink Q7119190.
- Q15122248 wikiPageWikiLink Q7144561.
- Q15122248 wikiPageWikiLink Q7210623.
- Q15122248 wikiPageWikiLink Q8203762.
- Q15122248 wikiPageWikiLink Q8302598.
- Q15122248 wikiPageWikiLink Q8333.
- Q15122248 wikiPageWikiLink Q83570.
- Q15122248 wikiPageWikiLink Q8475.
- Q15122248 wikiPageWikiLink Q869370.
- Q15122248 wikiPageWikiLink Q926331.
- Q15122248 wikiPageWikiLink Q946144.
- Q15122248 comment "CryptoLocker is a ransomware trojan which targeted computers running Microsoft Windows, believed to have first been posted to the Internet on 5 September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers.".
- Q15122248 label "CryptoLocker".