Statements (61)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Police_Department
|
gptkbp:associated_with |
Russian military intelligence
|
gptkbp:casualties |
espionage activities
|
gptkbp:collaborated_with |
other state actors
|
gptkbp:conducted |
attacks on election systems
cyber operations against NATO |
gptkbp:connects |
other hacking groups
|
gptkbp:convicted_of |
cyber attacks on critical infrastructure
|
gptkbp:enforces |
gptkb:U._S._government
|
https://www.w3.org/2000/01/rdf-schema#label |
Fancy Bear
|
gptkbp:is_active_in |
gptkb:Eastern_Europe
|
gptkbp:is_aimed_at |
international organizations
NATO member states U. S. Democratic National Committee |
gptkbp:is_associated_with |
various cyber espionage campaigns
|
gptkbp:is_considered |
a significant threat
a sophisticated adversary a threat to national security state-sponsored actor a major player in cyber warfare |
gptkbp:is_effective_against |
Western nations
|
gptkbp:is_engaged_in |
information warfare
|
gptkbp:is_involved_in |
gptkb:government_agency
data breaches election interference the hacking of the 2016 U. S. elections |
gptkbp:is_known_for |
aggressive tactics
social engineering tactics advanced persistent threats custom malware AP T28 a wide range of capabilities |
gptkbp:is_linked_to |
gptkb:GRU
various cyber incidents the theft of sensitive data the use of ransomware. |
gptkbp:is_often_associated_with |
cyber surveillance
|
gptkbp:is_part_of |
Russian cyber operations
a larger network of hackers |
gptkbp:is_recognized_by |
cybersecurity firms
|
gptkbp:known_for |
disinformation campaigns
hacking political organizations |
gptkbp:notable_conductors |
sustained cyber operations
|
gptkbp:operates_in |
cyberspace
|
gptkbp:operational_status |
gptkb:2007
|
gptkbp:performed_by |
spear phishing campaigns
|
gptkbp:religion |
state backing
responsible for cyber attacks |
gptkbp:reports_to |
phishing emails
operating globally access to sensitive information |
gptkbp:targets |
government agencies
defense contractors media organizations political figures |
gptkbp:uses |
spear phishing
|
gptkbp:utilizes |
gptkb:virus
sophisticated techniques Zero-day exploits |
gptkbp:bfsParent |
gptkb:Russian_hackers
|
gptkbp:bfsLayer |
5
|