gptkbp:instanceOf
|
cybercrime
|
gptkbp:activeYearsStart
|
at least 2007
|
gptkbp:alsoKnownAs
|
gptkb:APT28
|
gptkbp:associatedWith
|
gptkb:Russian_military_intelligence
|
gptkbp:attributedTo
|
high confidence by US and European intelligence
|
gptkbp:category
|
cybercrime
Advanced Persistent Threat
state-sponsored hacking group
|
gptkbp:connectsTo
|
gptkb:Unit_26165
gptkb:GRU
gptkb:Unit_74455
|
gptkbp:countryOfOrigin
|
gptkb:Russia
|
https://www.w3.org/2000/01/rdf-schema#label
|
TA-125
|
gptkbp:notableOperation
|
gptkb:2016_US_election_interference
gptkb:French_TV5Monde_hack
gptkb:German_Bundestag_hack
gptkb:Olympic_Destroyer_campaign
gptkb:World_Anti-Doping_Agency_hack
Ukrainian government attacks
|
gptkbp:reportsTo
|
gptkb:UK_National_Cyber_Security_Centre
gptkb:Microsoft
gptkb:US_Department_of_Justice
gptkb:CrowdStrike
gptkb:ESET
gptkb:FireEye
gptkb:Kaspersky_Lab
gptkb:ThreatConnect
|
gptkbp:tactics
|
credential harvesting
spear phishing
watering hole attacks
zero-day exploits
|
gptkbp:target
|
gptkb:energy
government organizations
military organizations
diplomatic entities
media organizations
defense contractors
|
gptkbp:usesMalware
|
gptkb:CHOPSTICK
gptkb:DealersChoice
gptkb:Fancy_Bear
gptkb:Gamefish
gptkb:Komplex
gptkb:LoJax
gptkb:Sednit
gptkb:Sofacy
gptkb:X-Agent
gptkb:Zebrocy
|
gptkbp:bfsParent
|
gptkb:TASE
gptkb:Checkpoint_Software_Technologies
|
gptkbp:bfsLayer
|
7
|