Statements (67)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Espionage
|
gptkbp:associated_with |
gptkb:APT28
gptkb:Russian_hackers cybercrime |
gptkbp:challenges |
government operations
|
gptkbp:communicated_via |
dark web
|
gptkbp:created |
anonymity for hackers
|
gptkbp:engaged_in |
gptkb:intelligence_gathering
spear phishing phishing attacks data theft ransomware attacks social media manipulation political hacking |
gptkbp:faced |
law enforcement scrutiny
|
https://www.w3.org/2000/01/rdf-schema#label |
Shadow Brokers
|
gptkbp:influenced |
cybersecurity policies
public perception of cybersecurity cybersecurity industry practices |
gptkbp:involved_in |
data breaches
identity theft sensitive data leaks international cyber espionage |
gptkbp:is_active_in |
gptkb:2016
|
gptkbp:is_believed_to |
gptkb:military_intelligence
government contracts zero-day vulnerabilities access to classified information government secrets advanced hacking capabilities insider knowledge |
gptkbp:is_targeted_at |
gptkb:financial_institutions
government agencies defense contractors telecommunications companies transportation systems healthcare organizations critical infrastructure energy sector |
gptkbp:known_for |
leaking NSA hacking tools
|
gptkbp:leaked |
Windows exploits
|
gptkbp:operates |
unknown location
|
gptkbp:operates_in |
multiple countries
cyber warfare stealth mode a decentralized manner a global context highly secretive manner |
gptkbp:operates_under |
multiple pseudonyms
an alias |
gptkbp:released |
gptkb:Eternal_Blue_exploit
malware samples exploit kits NSA documents Shadow Brokers' monthly dump cyber attack tools cyber weapons exploits for routers |
gptkbp:uses |
hacking tools
encrypted communication channels VPNs for anonymity anonymizing services cryptocurrency for payments stealth techniques. |
gptkbp:utilized |
social engineering tactics
|
gptkbp:bfsParent |
gptkb:Eternal_Blue
|
gptkbp:bfsLayer |
6
|