Statements (69)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Espionage
|
gptkbp:are |
a significant threat
a subject of media coverage highly skilled a subject of academic studies often elusive involved in cyber warfare a subject of diplomatic discussions a focus of law enforcement efforts a concern for national security a challenge for cybersecurity professionals a concern for private sector companies a focus of cybersecurity research a part of the cybercrime ecosystem a concern for global cybersecurity initiatives a focus of government investigations a focus of threat intelligence efforts a part of geopolitical strategies a part of the cyber espionage landscape a part of the digital arms race a part of the global cyber threat landscape a significant player in cyber operations a topic of international relations involved in ransomware attacks linked to specific incidents part of state-sponsored groups |
gptkbp:associated_with |
gptkb:Chinese_government
|
gptkbp:engages_in |
gptkb:Espionage
data theft |
gptkbp:have |
international reach
various tools various motivations a network of operatives a history of attacks a range of capabilities |
https://www.w3.org/2000/01/rdf-schema#label |
Chinese hackers
|
gptkbp:involved_in |
intellectual property theft
|
gptkbp:known_for |
advanced persistent threats (APTs)
|
gptkbp:often_have |
exploit vulnerabilities
use social media for reconnaissance target educational institutions collaborate with other groups leverage insider knowledge target financial institutions target healthcare organizations use encryption target supply chains change tactics engage in denial-of-service attacks exploit public vulnerabilities target research institutions target telecommunications networks use open-source intelligence use sophisticated techniques use VPNs |
gptkbp:operates_in |
in groups
|
gptkbp:origin |
gptkb:China
|
gptkbp:targets |
corporate networks
sensitive data critical infrastructure foreign companies government networks |
gptkbp:uses |
gptkb:virus
zero-day exploits phishing techniques |
gptkbp:utilizes |
social engineering
|
gptkbp:bfsParent |
gptkb:Plug_X_malware
gptkb:2015_attack_on_Git_Hub |
gptkbp:bfsLayer |
7
|