gptkbp:instanceOf
|
cybercrime
|
gptkbp:activeYearsStart
|
2012
|
gptkbp:alsoKnownAs
|
Thallium
Black Banshee
Velvet Chollima
|
gptkbp:associatedWith
|
North Korean Reconnaissance General Bureau
|
gptkbp:attributedTo
|
gptkb:United_States_Department_of_Homeland_Security
South Korean National Intelligence Service
|
gptkbp:connectsTo
|
gptkb:Lazarus_Group
gptkb:APT37
|
gptkbp:countryOfOrigin
|
gptkb:North_Korea
|
gptkbp:designation
|
gptkb:Advanced_Persistent_Threat_(APT)
|
https://www.w3.org/2000/01/rdf-schema#label
|
Kimsuky
|
gptkbp:language
|
gptkb:Korean
English
|
gptkbp:method
|
malware
phishing
spear-phishing
watering hole attacks
|
gptkbp:motive
|
gptkb:intelligence_gathering
espionage
political espionage
|
gptkbp:notableAttacks
|
2013 South Korean cyberattacks
COVID-19 themed phishing campaigns
Operation Kimsuky
|
gptkbp:notableFor
|
targeting journalists
targeting diplomatic officials
targeting human rights organizations
targeting nuclear policy experts
|
gptkbp:reportsTo
|
gptkb:Microsoft
gptkb:South_Korean_government
gptkb:FireEye
gptkb:Kaspersky_Lab
gptkb:US-CERT
ESTsecurity
|
gptkbp:target
|
gptkb:Europe
gptkb:Japan
gptkb:South_Korea
gptkb:United_States
gptkb:government_agency
universities
think tanks
defense contractors
|
gptkbp:usesMalware
|
gptkb:Konni
gptkb:BabyShark
Browser extensions
Keylogger
RATs
AppleSeed
CSPY Downloader
FastViewer
|
gptkbp:bfsParent
|
gptkb:APT43
gptkb:Red_Star_APT
gptkb:APT37
|
gptkbp:bfsLayer
|
8
|