PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Once on a victim???s PC, Critroni encrypts a variety of files, including photos and documents, and then displays a dialogue box that informs the user of the infection and demands a payment in Bitcoins in order to decrypt the files.???It uses C2 hidden in the Tor network.
http://www.w3.org/ns/prov#wasQuotedFrom
  • slashdot.org