Statements (31)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybercrime
|
| gptkbp:abbreviation |
gptkb:APT
|
| gptkbp:characterizedBy |
long-term presence
stealthy computer network attack |
| gptkbp:countermeasures |
network monitoring
threat intelligence endpoint protection user education |
| gptkbp:goal |
espionage
sabotage data theft |
| gptkbp:introducedIn |
2006
|
| gptkbp:notableExample |
gptkb:APT28
gptkb:APT29 gptkb:Equation_Group gptkb:Stuxnet |
| gptkbp:perpetrator |
organized crime groups
state-sponsored groups |
| gptkbp:relatedTo |
gptkb:cybercrime
information security cyber warfare |
| gptkbp:target |
corporations
government organizations critical infrastructure |
| gptkbp:technique |
gptkb:malware
phishing social engineering zero-day exploits |
| gptkbp:bfsParent |
gptkb:Privilege_Escalation
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Advanced Persistent Threats
|