Statements (38)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:associated_with |
gptkb:Espionage
|
gptkbp:can_detect |
gptkb:virus
intrusion detection systems behavioral analysis |
gptkbp:casualties |
gptkb:NTT_Group
gptkb:IBM gptkb:Mitsubishi |
gptkbp:country_of_origin |
gptkb:China
|
gptkbp:developed_by |
gptkb:APT10
|
gptkbp:discovered_by |
gptkb:2017
|
https://www.w3.org/2000/01/rdf-schema#label |
Cloud Hopper malware
|
gptkbp:impact |
financial loss
intellectual property theft data theft |
gptkbp:is_vulnerable_to |
supply chain vulnerabilities
|
gptkbp:notable_case |
data breaches
2017 cyber attacks targeted espionage campaigns |
gptkbp:related_to |
cybersecurity threats
supply chain attacks APT groups |
gptkbp:remediation_steps |
access controls
system updates vulnerability patching |
gptkbp:responds_to |
incident response
network monitoring user education |
gptkbp:target_market |
managed service providers
|
gptkbp:technique |
phishing
lateral movement malicious software installation |
gptkbp:threats |
cybercrime
advanced persistent threats state-sponsored hacking |
gptkbp:uses |
credential theft
|
gptkbp:bfsParent |
gptkb:APT10
|
gptkbp:bfsLayer |
6
|