gptkbp:instanceOf
|
cyber espionage campaign
|
gptkbp:activeYearsStart
|
2015
|
gptkbp:alsoKnownAs
|
gptkb:Dropping_Elephant
|
gptkbp:discoveredBy
|
gptkb:Kaspersky_Lab
gptkb:Symantec
|
https://www.w3.org/2000/01/rdf-schema#label
|
Operation Patchwork
|
gptkbp:languageOfMalware
|
gptkb:Java
gptkb:Python
gptkb:Visual_Basic
|
gptkbp:majorCity
|
gptkb:Afghanistan
gptkb:Bangladesh
gptkb:China
gptkb:India
gptkb:Nepal
gptkb:Pakistan
gptkb:Sri_Lanka
gptkb:United_States
|
gptkbp:motive
|
espionage
|
gptkbp:notableFor
|
long-term persistence
targeting high-profile organizations
use of simple but effective techniques
|
gptkbp:originatedIn
|
gptkb:India
|
gptkbp:target
|
government organizations
military organizations
research organizations
media organizations
diplomatic organizations
entities in South Asia
nuclear organizations
|
gptkbp:technique
|
custom malware
spear phishing
malicious documents
|
gptkbp:usedInfrastructure
|
compromised websites
cloud storage services
free email services
|
gptkbp:usesMalware
|
gptkb:BADNEWS
Dropper malware
Trojan downloaders
|
gptkbp:bfsParent
|
gptkb:FireEye
|
gptkbp:bfsLayer
|
6
|