gptkbp:instanceOf
|
cyber espionage campaign
|
gptkbp:activity
|
cybercrime
supply chain attacks
watering hole attacks
credential theft
intellectual property theft
|
gptkbp:alsoKnownAs
|
gptkb:Winnti_Group
|
gptkbp:attributedTo
|
gptkb:Chinese_state-sponsored_actors
|
gptkbp:connectsTo
|
gptkb:APT3
gptkb:APT34
gptkb:Blackfly
gptkb:APT15
gptkb:APT16
gptkb:APT39
gptkb:APT4
gptkb:APT40
gptkb:APT41
gptkb:APT42
gptkb:APT43
gptkb:APT44
gptkb:APT45
gptkb:APT47
gptkb:APT48
gptkb:APT49
gptkb:APT5
gptkb:APT50
gptkb:APT51
gptkb:APT52
gptkb:APT53
gptkb:APT54
gptkb:APT55
gptkb:APT56
gptkb:APT57
gptkb:APT58
gptkb:APT59
gptkb:APT6
gptkb:APT8
gptkb:APT9
gptkb:Bronze_Atlas
gptkb:GREF
gptkb:Group_72
gptkb:LEAD
gptkb:Wicked_Panda
gptkb:Wicked_Rose
gptkb:Wicked_Spider
gptkb:APT28
gptkb:APT33
gptkb:APT46
gptkb:APT60
gptkb:Double_Dragon
gptkb:APT38
gptkb:APT29
gptkb:APT10
gptkb:APT12
gptkb:APT17
gptkb:APT18
gptkb:APT19
gptkb:APT20
gptkb:APT21
gptkb:APT22
gptkb:APT23
gptkb:APT24
gptkb:APT25
gptkb:APT26
gptkb:APT27
gptkb:APT30
gptkb:APT31
gptkb:APT32
gptkb:APT35
gptkb:APT36
gptkb:APT37
gptkb:Cicada
BARIUM
|
gptkbp:countryOfOrigin
|
gptkb:China
|
gptkbp:firstReported
|
2011
|
https://www.w3.org/2000/01/rdf-schema#label
|
Operation Winnti
|
gptkbp:notableEvent
|
gptkb:CCleaner_supply_chain_attack
gptkb:ShadowPad_backdoor_deployment
attack on German chemical companies
attack on Hong Kong universities
attack on South Korean gaming companies
attack on pharmaceutical companies
|
gptkbp:perpetrator
|
gptkb:APT41
gptkb:Bronze_Atlas
gptkb:Wicked_Panda
gptkb:APT17
gptkb:Winnti_Group
|
gptkbp:target
|
gptkb:video_game
universities
government organizations
telecommunications companies
software companies
pharmaceutical companies
|
gptkbp:usesMalware
|
gptkb:PlugX
gptkb:Hacker's_Door
gptkb:LEMONDUCK
gptkb:PipeMon
gptkb:ShadowPad
gptkb:Skip-2.0
gptkb:Sogu
gptkb:Winnti_backdoor
gptkb:Winnti_malware
gptkb:Crosswalk
|
gptkbp:bfsParent
|
gptkb:FireEye
|
gptkbp:bfsLayer
|
6
|