Statements (67)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Police_Department
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Not_Petya_malware
|
gptkbp:affiliated_with |
gptkb:GRU
|
gptkbp:associated_with |
gptkb:Russia
cyber warfare cyber threats disinformation campaigns geopolitical conflicts state-sponsored hacking AP T28 |
gptkbp:conducts |
information warfare
|
https://www.w3.org/2000/01/rdf-schema#label |
Sandworm Team
|
gptkbp:is_aimed_at |
gptkb:NATO_countries
gptkb:Educational_Institution government agencies research institutions transportation systems energy sector telecommunications sector government contractors Ukrainian infrastructure |
gptkbp:is_engaged_in |
gptkb:government_agency
network infiltration data theft malicious software development |
gptkbp:is_involved_in |
ransomware attacks
cyber intelligence operations supply chain attacks cyber espionage campaigns Black Energy malware Not Petya malware attack Olympic Destroyer malware cyber sabotage operations |
gptkbp:known_for |
gptkb:military_operation
cyber attacks advanced persistent threats exploiting vulnerabilities targeting healthcare organizations spear phishing attacks targeting critical infrastructure cyber reconnaissance cyber sabotage data destruction targeting educational institutions exploiting software vulnerabilities disruptive cyber operations advanced cyber tactics disruption of power grids exploiting human factors exploiting supply chain vulnerabilities targeting military organizations wiper malware |
gptkbp:operates |
gptkb:Russia
|
gptkbp:operates_in |
cybersecurity landscape
cyber domain digital warfare international cyber space |
gptkbp:operational_status |
gptkb:2014
|
gptkbp:uses |
cyber espionage tactics
|
gptkbp:utilizes |
zero-day exploits
botnets social engineering tactics credential theft network scanning tools phishing techniques malware development |