gptkbp:instanceOf
|
cyber threat group
|
gptkbp:activeYearsStart
|
at least 2007
|
gptkbp:alsoKnownAs
|
gptkb:APT28
gptkb:Fancy_Bear
|
gptkbp:associatedWith
|
gptkb:GRU
gptkb:Russian_military_intelligence
|
gptkbp:attributedTo
|
gptkb:Microsoft
gptkb:US_Department_of_Justice
gptkb:CrowdStrike
gptkb:FireEye
|
gptkbp:countryOfOrigin
|
gptkb:Russia
|
gptkbp:hasLanguage
|
gptkb:Russian
|
https://www.w3.org/2000/01/rdf-schema#label
|
TA-89
|
gptkbp:infrastructure
|
command and control servers
compromised email accounts
malicious domains
phishing websites
|
gptkbp:involves
|
gptkb:2016_United_States_elections_interference
gptkb:French_presidential_election_hack
gptkb:German_Bundestag_hack
gptkb:Olympic_Destroyer_campaign
gptkb:World_Anti-Doping_Agency_hack
|
gptkbp:motive
|
espionage
political influence
disruption
information theft
|
gptkbp:signature
|
gptkb:Sofacy_toolkit
custom malware
unique phishing lures
|
gptkbp:target
|
gptkb:NATO
gptkb:Parliament_of_the_United_Kingdom
gptkb:United_States_government
government organizations
military organizations
European governments
media organizations
political organizations
|
gptkbp:technique
|
credential harvesting
spear phishing
watering hole attacks
zero-day exploits
|
gptkbp:usesMalware
|
gptkb:CHOPSTICK
gptkb:DealersChoice
gptkb:Gamefish
gptkb:Komplex
gptkb:Sednit
gptkb:Sofacy
gptkb:X-Agent
gptkb:Zebrocy
|
gptkbp:bfsParent
|
gptkb:Los_Alamos_National_Laboratory
|
gptkbp:bfsLayer
|
4
|