http://dbpedia.org/ontology/abstract
|
APT40 (also known as BRONZE MOHAWK (by Sec … APT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative. APT40 is closely connected to Hafnium.ve. APT40 is closely connected to Hafnium.
|
http://dbpedia.org/ontology/alternativeName
|
Hellsing
, Leviathan
, Gadolinium
, GreenCrash
, TEMP.Periscope
, Kryptonite Panda
, Temp.Jumper
, APT40
, Bronze Mohawk
|
http://dbpedia.org/ontology/headquarter
|
http://dbpedia.org/resource/Hainan_Province +
|
http://dbpedia.org/ontology/language
|
http://dbpedia.org/resource/Chinese_language +
|
http://dbpedia.org/ontology/parentOrganisation
|
http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 +
|
http://dbpedia.org/ontology/purpose
|
Cyberespionage,
|
http://dbpedia.org/ontology/regionServed
|
http://dbpedia.org/resource/China +
|
http://dbpedia.org/ontology/type
|
http://dbpedia.org/resource/Advanced_persistent_threat +
|
http://dbpedia.org/ontology/wikiPageID
|
68274256
|
http://dbpedia.org/ontology/wikiPageLength
|
4051
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
1108212326
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/U.S._Department_of_Justice +
, http://dbpedia.org/resource/Spearphishing +
, http://dbpedia.org/resource/South_China_Sea +
, http://dbpedia.org/resource/Category:Hacking_%28computer_security%29 +
, http://dbpedia.org/resource/Middle_East +
, http://dbpedia.org/resource/United_States +
, http://dbpedia.org/resource/Cyberespionage +
, http://dbpedia.org/resource/Governmental_organizations +
, http://dbpedia.org/resource/Hainan_Province +
, http://dbpedia.org/resource/Cyberwarfare_by_China +
, http://dbpedia.org/resource/Crowdstrike +
, http://dbpedia.org/resource/Category:Cyberwarfare +
, http://dbpedia.org/resource/Red_Apollo +
, http://dbpedia.org/resource/Keylogging +
, http://dbpedia.org/resource/Chinese_language +
, http://dbpedia.org/resource/Microsoft +
, http://dbpedia.org/resource/Malware +
, http://dbpedia.org/resource/Remote_Access_Trojan +
, http://dbpedia.org/resource/Europe +
, http://dbpedia.org/resource/Zero-day_%28computing%29 +
, http://dbpedia.org/resource/Hafnium_%28group%29 +
, http://dbpedia.org/resource/Category:Chinese_advanced_persistent_threat_groups +
, http://dbpedia.org/resource/Secureworks +
, http://dbpedia.org/resource/China +
, http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 +
, http://dbpedia.org/resource/Belt_and_Road_Initiative +
, http://dbpedia.org/resource/People%27s_Republic_of_China +
, http://dbpedia.org/resource/Kaspersky +
, http://dbpedia.org/resource/Advanced_persistent_threat +
, http://dbpedia.org/resource/Canada +
, http://dbpedia.org/resource/Backdoor_%28computing%29 +
, http://dbpedia.org/resource/Proofpoint%2C_Inc. +
, http://dbpedia.org/resource/Category:Espionage +
, http://dbpedia.org/resource/Haikou +
|
http://dbpedia.org/property/formation
|
2009
|
http://dbpedia.org/property/formerly
|
TEMP.Periscope
, Bronze Mohawk
, Temp.Jumper
, GreenCrash
, Kryptonite Panda
, Gadolinium
, Hellsing
, Leviathan
, APT40
|
http://dbpedia.org/property/headquarters
|
http://dbpedia.org/resource/Hainan_Province +
|
http://dbpedia.org/property/language
|
http://dbpedia.org/resource/Chinese_language +
|
http://dbpedia.org/property/methods
|
Malware, Zero-days, Phishing, backdoor (computing), RAT, Keylogging
|
http://dbpedia.org/property/name
|
Leviathan
|
http://dbpedia.org/property/parentOrganization
|
http://dbpedia.org/resource/Ministry_of_State_Security_%28China%29 +
|
http://dbpedia.org/property/purpose
|
http://dbpedia.org/resource/Cyberespionage +
|
http://dbpedia.org/property/region
|
http://dbpedia.org/resource/China +
|
http://dbpedia.org/property/type
|
http://dbpedia.org/resource/Advanced_persistent_threat +
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:Ref +
, http://dbpedia.org/resource/Template:Infobox_organization +
, http://dbpedia.org/resource/Template:Circa +
, http://dbpedia.org/resource/Template:Hacking_in_the_2020s +
, http://dbpedia.org/resource/Template:Hacking_in_the_2010s +
, http://dbpedia.org/resource/Template:Computer-security-stub +
, http://dbpedia.org/resource/Template:Short_description +
, http://dbpedia.org/resource/Template:Reflist +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Hacking_%28computer_security%29 +
, http://dbpedia.org/resource/Category:Espionage +
, http://dbpedia.org/resource/Category:Chinese_advanced_persistent_threat_groups +
, http://dbpedia.org/resource/Category:Cyberwarfare +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/APT40?oldid=1108212326&ns=0 +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/APT40 +
|
http://xmlns.com/foaf/0.1/name
|
Leviathan
|
owl:sameAs |
https://global.dbpedia.org/id/Forzx +
, http://www.wikidata.org/entity/Q104417057 +
, http://he.dbpedia.org/resource/Leviathan +
, http://dbpedia.org/resource/APT40 +
|
rdf:type |
http://dbpedia.org/ontology/Agent +
, http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#Agent +
, http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#SocialPerson +
, http://www.wikidata.org/entity/Q43229 +
, http://dbpedia.org/ontology/Organisation +
, http://schema.org/Organization +
, http://www.wikidata.org/entity/Q24229398 +
|
rdfs:comment |
APT40 (also known as BRONZE MOHAWK (by Sec … APT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative.luded in China's Belt and Road Initiative.
|
rdfs:label |
APT40
|