Statements (81)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cyber attack
|
gptkbp:aimsTo |
steal money
|
gptkbp:associatedWith |
ransomware
|
gptkbp:encouraged |
investigations by authorities
|
gptkbp:enemy |
sensitive data
|
gptkbp:highlights |
vulnerabilities in systems
|
https://www.w3.org/2000/01/rdf-schema#label |
Cerberus Attack
|
gptkbp:impact |
thousands of victims
|
gptkbp:involved |
data manipulation
data breaches data exfiltration network infiltration cyber espionage zero-day exploits international collaboration malicious software malicious actors identity theft credential theft cybersecurity vulnerabilities financial fraud advanced persistent threats malware distribution spear phishing attacks phishing techniques cybersecurity breaches data theft incidents financial data theft malicious actors from various countries targeted attacks on organizations targeted cyber operations targeted cyber threats targeted data breaches targeted financial attacks targeted identity theft targeted malware attacks targeted phishing campaigns targeted ransomware attacks |
gptkbp:ledTo |
regulatory changes
increased funding for cybersecurity |
gptkbp:locatedIn |
2020
|
gptkbp:originatesFrom |
gptkb:Eastern_Europe
|
gptkbp:resultedIn |
financial losses
|
gptkbp:targets |
financial institutions
multiple countries critical infrastructure |
gptkbp:updates |
cybersecurity awareness
|
gptkbp:uses |
social engineering tactics
|
gptkbp:utilizes |
malware
|
gptkbp:was |
a significant threat
a high-profile case a complex operation highly sophisticated a coordinated effort a global concern a high-stakes operation a notable event a complex cyber operation a coordinated cybercrime effort a critical cybersecurity threat a critical incident in cybersecurity a high-impact cyber event a major concern for IT security teams a major cybersecurity incident a major cybersecurity risk a major incident a multi-faceted attack a notable cybersecurity challenge a notable cybersecurity threat a serious cybersecurity issue a serious threat a serious threat to data security a significant breach a significant cybersecurity challenge a significant risk to organizations a significant threat landscape a significant threat to businesses a sophisticated cyber threat a targeted campaign a wake-up call for businesses reported widely in media |