Statements (29)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cyber espionage campaign
|
gptkbp:alsoKnownAs |
gptkb:Tropic_Trooper
|
gptkbp:attributedTo |
gptkb:Chinese-speaking_threat_actors
|
gptkbp:discoveredBy |
gptkb:Kaspersky_Lab
gptkb:Trend_Micro |
gptkbp:firstReported |
2015
|
gptkbp:goal |
espionage
data theft |
https://www.w3.org/2000/01/rdf-schema#label |
Operation Tropic Trooper
|
gptkbp:relatedTo |
APT campaigns in East Asia
|
gptkbp:target |
gptkb:Hong_Kong
gptkb:Philippines gptkb:Taiwan gptkb:government_agency healthcare sector military organizations transportation sector high-tech industries |
gptkbp:technique |
malicious email attachments
spear phishing watering hole attacks |
gptkbp:usesMalware |
gptkb:Chinoxy
gptkb:Neshta gptkb:Pirpi gptkb:Trojan.Mdropper gptkb:Poison_Ivy Yahoyah |
gptkbp:bfsParent |
gptkb:FireEye
|
gptkbp:bfsLayer |
6
|