This HTML5 document contains 25 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n19http://dbkwik.webdatacommons.org/resource/JZK7RwE-9uTp7P-hk7qJrA==
n26http://dbkwik.webdatacommons.org/resource/L5OUQCas3NG0Nvi_BWCthQ==
n17http://dbkwik.webdatacommons.org/resource/z1ttHE7JUWtWmgtTOJ7cFQ==
dctermshttp://purl.org/dc/terms/
n8http://dbkwik.webdatacommons.org/ontology/
n13http://dbkwik.webdatacommons.org/resource/X3CR4brb2FbwSjg2QWI6ng==
n22http://dbkwik.webdatacommons.org/resource/BbGNpUoyqlhnLB-H6rqt5g==
n4http://dbkwik.webdatacommons.org/resource/HWNbtMOqxn-xkaYhT85X-g==
n23http://dbkwik.webdatacommons.org/resource/BqFntJQ1yLB3zJSkbF-5Ng==
n11http://dbkwik.webdatacommons.org/malware/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n28http://dbkwik.webdatacommons.org/resource/bJSRefAdJpijlMeRFSsMvw==
n18http://dbkwik.webdatacommons.org/resource/wro69gwig4pXRModJ0yefw==
n32http://dbkwik.webdatacommons.org/resource/qI54cYGpy-PO9erMKoc5Bw==
n20http://dbkwik.webdatacommons.org/resource/QOiHI65D1hgrGLRWDIQNKw==
n21http://dbkwik.webdatacommons.org/resource/ZQFDLCYxvf30Sskcftgc7g==
n6http://dbkwik.webdatacommons.org/resource/sNtuKMvuNGaqGZFqB4HXag==
n31http://dbkwik.webdatacommons.org/resource/LUX5OMZw6Ud3zwHW17JPvQ==
n12http://dbkwik.webdatacommons.org/resource/YaiKYI3zY78PgDBgR4i4Qw==
n24http://dbkwik.webdatacommons.org/resource/dSzv-LCs3S-sOrIk6STpxQ==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n3http://dbkwik.webdatacommons.org/starwars/property/
n29http://dbkwik.webdatacommons.org/resource/8dGhkp_vzOtkXWBeeFVk1A==
n15http://dbkwik.webdatacommons.org/resource/F_j8ASzeeVYnurM3HJQXEA==
n30http://dbkwik.webdatacommons.org/resource/eRxig1TC93bg9vbHCF3Atg==
n2http://dbkwik.webdatacommons.org/resource/ocyYCuMEcniA7cS0bGqjFQ==
n25http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n9http://dbkwik.webdatacommons.org/resource/gyYJh9pYHUzmjBfPVBYDuQ==
n7http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n16http://dbkwik.webdatacommons.org/resource/l5gLjy0mcDHJZl83r62g5A==
n27http://dbkwik.webdatacommons.org/resource/gk7VFDOatg2gd0EEc_JKTg==
n10http://dbkwik.webdatacommons.org/resource/LSCgMYmF8tZtAXHaJPAg9w==
Subject Item
n2:
rdfs:label
Dyre
rdfs:comment
It also downloads additional malware on to the victim’s computer. In many cases, the victim is added to a botnet which is then used to send out thousands of spam emails in order to spread the threat further.
n17:
n18:
dcterms:subject
n15: n16: n24: n30:
n11:wikiPageUsesTemplate
n12: n19:
n3:wikiPageUsesTemplate
n4: n6: n22: n23: n26: n31: n32:
n10:
*Galactic Republic **Grand Army of the Republic ***Breakout Squad
n7:
"Dyre"
n25:
Galactic Republic
n27:
1.83
n9:
Human
n28:
n29:
n20:
n21:
n13:
22
n8:abstract
It also downloads additional malware on to the victim’s computer. In many cases, the victim is added to a botnet which is then used to send out thousands of spam emails in order to spread the threat further. Dyre is capable of attacking the three most commonly used Windows web browsers (Internet Explorer, Chrome, and Firefox) in order to steal credentials. It uses a number of different man-in-the-browser (MITB) attack techniques to do this. One MITB technique involves the malware checking the URL of every web page visited by the victim to see if it is one of those listed in its configuration files. If there is a match, it will then redirect the victim to a malicious server. If the server is configured to hijack the web page, it sends the victim to a fake web page which looks very similar to the genuine one. This page will then harvest any credentials that the victim enters before redirecting them to the genuine web page in order to avoid raising suspicion.