gptkbp:instanceOf
|
malware
|
gptkbp:abilities
|
audio recordings
screenshot capture
command and control communication
file exfiltration
keylogging
stealth operation
|
gptkbp:alsoKnownAs
|
gptkb:XAgent
gptkb:APT28
gptkb:Sednit
gptkb:Sofacy
|
gptkbp:associatedWith
|
gptkb:Democratic_National_Committee_cyber_attacks
Russian cyber operations
|
gptkbp:category
|
cyber espionage tool
advanced persistent threat malware
state-sponsored malware
|
gptkbp:connectsTo
|
gptkb:GRU
gptkb:Russian_military_intelligence
|
gptkbp:developedBy
|
gptkb:Fancy_Bear
|
gptkbp:discoveredBy
|
2014
|
gptkbp:distributedBy
|
phishing emails
malicious attachments
watering hole attacks
|
https://www.w3.org/2000/01/rdf-schema#label
|
X-Agent
|
gptkbp:notableEvent
|
gptkb:2016_US_election_interference
gptkb:French_TV5Monde_hack
gptkb:German_Bundestag_hack
gptkb:DNC_hack
|
gptkbp:platform
|
gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
|
gptkbp:usedBy
|
gptkb:APT28
|
gptkbp:usedFor
|
cybercrime
surveillance
data theft
|
gptkbp:usesMalware
|
malware
Trojan
|
gptkbp:vulnerableTo
|
gptkb:CVE-2016-7855
gptkb:CVE-2017-0199
gptkb:CVE-2017-0261
gptkb:CVE-2017-0262
gptkb:CVE-2017-0263
gptkb:CVE-2017-11292
|
gptkbp:bfsParent
|
gptkb:TA-102
gptkb:TA-105
gptkb:TA-87
gptkb:TA-89
|
gptkbp:bfsLayer
|
5
|