About: Samsam   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Samsam was a Human male Corellian scientist who was a friend to Bant'ena Fhernan during the Clone Wars. As Bant'ena was captured by the separatists in 21 BBY, Samsam was used as leverage against Bant'ena under Lok Durd's command. However, he was shot by a Separatist assassin while power-gliding along the shore of Lake Radu.

AttributesValues
rdfs:label
  • Samsam
  • SAMSAM
  • SamSam
rdfs:comment
  • Samsam was a Human male Corellian scientist who was a friend to Bant'ena Fhernan during the Clone Wars. As Bant'ena was captured by the separatists in 21 BBY, Samsam was used as leverage against Bant'ena under Lok Durd's command. However, he was shot by a Separatist assassin while power-gliding along the shore of Lake Radu.
  • "MSIL or Samas (SAMSAM) was used to compromise the networks of multiple U.S. victims, including 2016 attacks on healthcare facilities that were running outdated versions of the JBoss content management application. SAMSAM exploits vulnerable Java-based Web servers. SAMSAM uses open-source tools to identify and compile a list of hosts reporting to the victim's active directory. The actors then use psexec.exe to distribute the malware to each host on the network and encrypt most of the files on the system. The actors charge varying amounts in Bitcoin to provide the decryption keys to the victim."
sameAs
Era
dcterms:subject
dbkwik:starwars/pr...iPageUsesTemplate
Name
  • Samsam
Species
dbkwik:nl.illogico...iPageUsesTemplate
Homeworld
Gender
Death
  • 21(xsd:integer)
abstract
  • Samsam was a Human male Corellian scientist who was a friend to Bant'ena Fhernan during the Clone Wars. As Bant'ena was captured by the separatists in 21 BBY, Samsam was used as leverage against Bant'ena under Lok Durd's command. However, he was shot by a Separatist assassin while power-gliding along the shore of Lake Radu.
  • "MSIL or Samas (SAMSAM) was used to compromise the networks of multiple U.S. victims, including 2016 attacks on healthcare facilities that were running outdated versions of the JBoss content management application. SAMSAM exploits vulnerable Java-based Web servers. SAMSAM uses open-source tools to identify and compile a list of hosts reporting to the victim's active directory. The actors then use psexec.exe to distribute the malware to each host on the network and encrypt most of the files on the system. The actors charge varying amounts in Bitcoin to provide the decryption keys to the victim."
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software