Statements (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
malware
|
gptkbp:activeYearsStart |
at least 2008
|
gptkbp:alsoKnownAs |
gptkb:Turla
|
gptkbp:associatedWith |
gptkb:Russia
Russian state-sponsored threat actors |
gptkbp:attributedTo |
gptkb:ESET
gptkb:FireEye gptkb:Kaspersky_Lab gptkb:Mandiant gptkb:Symantec |
gptkbp:connectsTo |
gptkb:FSB
gptkb:Russian_intelligence_services |
https://www.w3.org/2000/01/rdf-schema#label |
TA-64
|
gptkbp:notableOperation |
gptkb:Epic_Turla
gptkb:Moonlight_Maze Snake/Uroburos |
gptkbp:target |
private sector organizations
government organizations military organizations diplomatic entities |
gptkbp:targetsRegion |
gptkb:Asia
gptkb:Europe gptkb:Middle_East gptkb:United_States |
gptkbp:uses |
gptkb:Carbon_malware
gptkb:ComRAT_malware gptkb:Gazer_malware gptkb:Kazuar_malware gptkb:Kopiluwak_malware gptkb:Metasploit gptkb:Skipper_malware social engineering Java exploits PDF exploits PowerShell scripts command and control servers compromised legitimate websites credential harvesting custom backdoors custom encryption custom malware encrypted communications exfiltration tools fileless malware techniques living off the land techniques malicious email attachments modular malware architecture spear phishing watering hole attacks watering hole websites zero-day exploits |
gptkbp:bfsParent |
gptkb:Los_Alamos_National_Laboratory
|
gptkbp:bfsLayer |
4
|