Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/APT40
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/APT40
http://dbpedia.org/ontology/abstract APT40 (also known as BRONZE MOHAWK (by SecAPT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative. APT40 is closely connected to Hafnium.ve. APT40 is closely connected to Hafnium.
http://dbpedia.org/ontology/alternativeName Hellsing , Leviathan , Gadolinium , GreenCrash , TEMP.Periscope , Kryptonite Panda , Temp.Jumper , APT40 , Bronze Mohawk
http://dbpedia.org/ontology/headquarter http://dbpedia.org/resource/Hainan_Province +
http://dbpedia.org/ontology/language http://dbpedia.org/resource/Chinese_language +
http://dbpedia.org/ontology/parentOrganisation http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 +
http://dbpedia.org/ontology/purpose Cyberespionage,
http://dbpedia.org/ontology/regionServed http://dbpedia.org/resource/China +
http://dbpedia.org/ontology/type http://dbpedia.org/resource/Advanced_persistent_threat +
http://dbpedia.org/ontology/wikiPageID 68274256
http://dbpedia.org/ontology/wikiPageLength 4051
http://dbpedia.org/ontology/wikiPageRevisionID 1108212326
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/U.S._Department_of_Justice + , http://dbpedia.org/resource/Spearphishing + , http://dbpedia.org/resource/South_China_Sea + , http://dbpedia.org/resource/Category:Hacking_%28computer_security%29 + , http://dbpedia.org/resource/Middle_East + , http://dbpedia.org/resource/United_States + , http://dbpedia.org/resource/Cyberespionage + , http://dbpedia.org/resource/Governmental_organizations + , http://dbpedia.org/resource/Hainan_Province + , http://dbpedia.org/resource/Cyberwarfare_by_China + , http://dbpedia.org/resource/Crowdstrike + , http://dbpedia.org/resource/Category:Cyberwarfare + , http://dbpedia.org/resource/Red_Apollo + , http://dbpedia.org/resource/Keylogging + , http://dbpedia.org/resource/Chinese_language + , http://dbpedia.org/resource/Microsoft + , http://dbpedia.org/resource/Malware + , http://dbpedia.org/resource/Remote_Access_Trojan + , http://dbpedia.org/resource/Europe + , http://dbpedia.org/resource/Zero-day_%28computing%29 + , http://dbpedia.org/resource/Hafnium_%28group%29 + , http://dbpedia.org/resource/Category:Chinese_advanced_persistent_threat_groups + , http://dbpedia.org/resource/Secureworks + , http://dbpedia.org/resource/China + , http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 + , http://dbpedia.org/resource/Belt_and_Road_Initiative + , http://dbpedia.org/resource/People%27s_Republic_of_China + , http://dbpedia.org/resource/Kaspersky + , http://dbpedia.org/resource/Advanced_persistent_threat + , http://dbpedia.org/resource/Canada + , http://dbpedia.org/resource/Backdoor_%28computing%29 + , http://dbpedia.org/resource/Proofpoint%2C_Inc. + , http://dbpedia.org/resource/Category:Espionage + , http://dbpedia.org/resource/Haikou +
http://dbpedia.org/property/formation 2009
http://dbpedia.org/property/formerly TEMP.Periscope , Bronze Mohawk , Temp.Jumper , GreenCrash , Kryptonite Panda , Gadolinium , Hellsing , Leviathan , APT40
http://dbpedia.org/property/headquarters http://dbpedia.org/resource/Hainan_Province +
http://dbpedia.org/property/language http://dbpedia.org/resource/Chinese_language +
http://dbpedia.org/property/methods Malware, Zero-days, Phishing, backdoor (computing), RAT, Keylogging
http://dbpedia.org/property/name Leviathan
http://dbpedia.org/property/parentOrganization http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 +
http://dbpedia.org/property/purpose http://dbpedia.org/resource/Cyberespionage +
http://dbpedia.org/property/region http://dbpedia.org/resource/China +
http://dbpedia.org/property/type http://dbpedia.org/resource/Advanced_persistent_threat +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Ref + , http://dbpedia.org/resource/Template:Infobox_organization + , http://dbpedia.org/resource/Template:Circa + , http://dbpedia.org/resource/Template:Hacking_in_the_2020s + , http://dbpedia.org/resource/Template:Hacking_in_the_2010s + , http://dbpedia.org/resource/Template:Computer-security-stub + , http://dbpedia.org/resource/Template:Short_description + , http://dbpedia.org/resource/Template:Reflist +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Hacking_%28computer_security%29 + , http://dbpedia.org/resource/Category:Espionage + , http://dbpedia.org/resource/Category:Chinese_advanced_persistent_threat_groups + , http://dbpedia.org/resource/Category:Cyberwarfare +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/APT40?oldid=1108212326&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/APT40 +
http://xmlns.com/foaf/0.1/name Leviathan
owl:sameAs https://global.dbpedia.org/id/Forzx + , http://www.wikidata.org/entity/Q104417057 + , http://he.dbpedia.org/resource/Leviathan + , http://dbpedia.org/resource/APT40 +
rdf:type http://dbpedia.org/ontology/Agent + , http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#Agent + , http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#SocialPerson + , http://www.wikidata.org/entity/Q43229 + , http://dbpedia.org/ontology/Organisation + , http://schema.org/Organization + , http://www.wikidata.org/entity/Q24229398 +
rdfs:comment APT40 (also known as BRONZE MOHAWK (by SecAPT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative.luded in China's Belt and Road Initiative.
rdfs:label APT40
hide properties that link here 
http://dbpedia.org/resource/Double_Dragon_%28hacking_group%29 + , http://dbpedia.org/resource/Hafnium_%28group%29 + , http://dbpedia.org/resource/Periscope_Group + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/APT40 + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/APT40 + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.