Chinese state-sponsored actors
GPTKB entity
Statements (52)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:state-sponsored_actors
|
| gptkbp:activeYearsStart |
1990s
|
| gptkbp:associatedWith |
gptkb:Chinese_government
|
| gptkbp:connectsTo |
gptkb:Ministry_of_State_Security
gptkb:People's_Liberation_Army |
| gptkbp:countryOfOrigin |
gptkb:China
|
| gptkbp:engagedIn |
gptkb:cybercrime
cyber attacks intellectual property theft |
| gptkbp:involves |
gptkb:Equifax_data_breach
attacks on healthcare organizations attacks on energy sector attacks on defense contractors COVID-19 research targeting Office of Personnel Management data breach intellectual property theft from technology companies attacks on telecommunications companies |
| gptkbp:monitors |
gptkb:US_Department_of_Justice
gptkb:FBI cybersecurity firms |
| gptkbp:motive |
economic espionage
political intelligence strategic influence military advantage |
| gptkbp:notableGroup |
gptkb:APT3
gptkb:Red_Apollo gptkb:APT41 gptkb:APT10 gptkb:APT27 gptkb:Charming_Kitten gptkb:Naikon gptkb:Winnti_Group |
| gptkbp:opposedBy |
gptkb:Chinese_government
|
| gptkbp:subjectOf |
gptkb:sanctions
cybersecurity reports indictments by US authorities |
| gptkbp:target |
foreign governments
private sector organizations critical infrastructure |
| gptkbp:uses |
gptkb:malware
phishing custom malware living off the land techniques spear phishing supply chain attacks watering hole attacks zero-day exploits remote access trojans |
| gptkbp:bfsParent |
gptkb:Operation_CuckooBees
gptkb:Operation_Winnti |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Chinese state-sponsored actors
|