gptkbp:instance_of
|
gptkb:Espionage
|
gptkbp:associated_with
|
gptkb:Chinese_government
|
gptkbp:has_been_attributed_to
|
gptkb:Ministry_of_State_Security_of_China
|
gptkbp:has_performed_at
|
gptkb:intelligence_gathering
supply chain attacks
industrial espionage
|
https://www.w3.org/2000/01/rdf-schema#label
|
APT10
|
gptkbp:is_active_in
|
gptkb:Europe
gptkb:Asia
gptkb:North_America
|
gptkbp:is_believed_to
|
state-sponsored
|
gptkbp:is_considered
|
gptkb:advanced_persistent_threat
highly organized
highly sophisticated
well-funded
|
gptkbp:is_known_for
|
long-term campaigns
|
gptkbp:is_known_to
|
zero-day exploits
social engineering tactics
web shells
|
gptkbp:is_part_of
|
Chinese cyber operations
|
gptkbp:is_targeted_at
|
gptkb:Japan
gptkb:United_States
defense contractors
government organizations
telecommunications companies
healthcare organizations
technology firms
European countries
private sector companies
|
gptkbp:known_as
|
gptkb:Stone_Panda
|
gptkbp:known_for
|
cyber attacks
|
gptkbp:operational_since
|
gptkb:2009
|
gptkbp:originated_in
|
gptkb:China
|
gptkbp:reported_by
|
change tactics frequently
exploit vulnerabilities
have a global reach
be highly adaptive
links to other APT groups
target sensitive data
|
gptkbp:targets
|
gptkb:Public_School
gptkb:financial_institutions
critical infrastructure
energy sector
transportation sector
|
gptkbp:uses
|
gptkb:virus
spear phishing
remote access tools
credential harvesting
data exfiltration techniques
|
gptkbp:utilized
|
gptkb:Cobalt_Strike
gptkb:Cloud_Hopper_malware
gptkb:Plug_X_malware
|
gptkbp:bfsParent
|
gptkb:The_Dark_Army
|
gptkbp:bfsLayer
|
5
|