Statements (67)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybercriminals
|
gptkbp:area |
state-sponsored activities
|
gptkbp:engagesIn |
hacking
|
gptkbp:has |
international reach
varied backgrounds complex networks various motivations high technical skills |
https://www.w3.org/2000/01/rdf-schema#label |
Russian cybercriminals
|
gptkbp:is_used_in |
VPNs
individuals online forums stealth techniques data mining techniques remote access tools cyberstalking hacktivists organized crime groups anonymity tools encrypted communication credential stuffing attacks online auction fraud other cybercriminals cyberbullying tactics malicious ads online gambling fraud social media scams |
gptkbp:isActiveIn |
cyber espionage
|
gptkbp:isInvolvedIn |
spear phishing
money laundering identity theft credit card fraud fake tech support scams business email compromise fake charities fake investment schemes fake job postings ATM_skimming |
gptkbp:isKnownFor |
DDoS attacks
data breaches insider threats ransomware attacks exfiltrating data selling hacking tools selling personal information exploiting social media platforms cryptojacking exploiting mobile apps exploiting vulnerabilities in IoT devices |
gptkbp:operatesIn |
dark web
|
gptkbp:popularActivities |
tactics
supply chain vulnerabilities |
gptkbp:security |
zero-day vulnerabilities
|
gptkbp:sells |
stolen data
|
gptkbp:targets |
educational institutions
financial institutions government agencies non-profit organizations e-commerce sites real estate transactions transportation systems retail businesses healthcare_organizations |
gptkbp:uses |
malware
social engineering botnets |
gptkbp:utilizes |
phishing techniques
|