@prefix foaf: . @prefix wikipedia-en: . @prefix dbr: . wikipedia-en:APT40 foaf:primaryTopic dbr:APT40 . @prefix dbo: . dbo:wikiPageWikiLink dbr:APT40 . dbo:wikiPageWikiLink dbr:APT40 . @prefix rdf: . @prefix schema: . dbr:APT40 rdf:type schema:Organization . @prefix wikidata: . dbr:APT40 rdf:type wikidata:Q43229 . @prefix owl: . dbr:APT40 rdf:type owl:Thing , dbo:Organisation , wikidata:Q24229398 , dbo:Agent . @prefix ns8: . dbr:APT40 rdf:type ns8:Agent , ns8:SocialPerson . @prefix rdfs: . dbr:APT40 rdfs:label "APT40"@en ; rdfs:comment "APT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has _targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative."@en ; foaf:name "Leviathan"@en . @prefix dct: . @prefix dbc: . dbr:APT40 dct:subject dbc:Espionage , dbc:Chinese_advanced_persistent_threat_groups , dbc:Cyberwarfare , ; dbo:abstract "APT40 (also known as BRONZE MOHAWK (by Secureworks), FEVERDREAM, G0065, Gadolinium (by Microsoft), GreenCrash, Hellsing (by Kaspersky), Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has _targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative. APT40 is closely connected to Hafnium."@en ; dbo:wikiPageWikiLink dbc:Cyberwarfare , dbr:Governmental_organizations , , , dbr:Chinese_language , dbr:Belt_and_Road_Initiative , dbr:Cyberespionage , dbr:Spearphishing , , dbc:Espionage , , , dbr:China , dbr:Hainan_Province , dbr:Advanced_persistent_threat , , , dbr:Remote_Access_Trojan , dbc:Chinese_advanced_persistent_threat_groups , dbr:Europe , dbr:Keylogging , dbr:United_States , , dbr:Crowdstrike , dbr:Kaspersky , dbr:Red_Apollo , dbr:Middle_East , dbr:Canada , dbr:Cyberwarfare_by_China , dbr:Haikou , dbr:South_China_Sea , dbr:Microsoft , dbr:Secureworks , dbr:Malware . @prefix dbp: . @prefix dbt: . dbr:APT40 dbp:wikiPageUsesTemplate dbt:Computer-security-stub , dbt:Hacking_in_the_2020s , dbt:Hacking_in_the_2010s , dbt:Ref , dbt:Reflist , dbt:Short_description , dbt:Circa , dbt:Infobox_organization ; dbo:wikiPageRevisionID 1108212326 . @prefix xsd: . dbr:APT40 dbo:wikiPageLength "4051"^^xsd:nonNegativeInteger ; dbo:wikiPageID 68274256 ; dbp:language dbr:Chinese_language ; dbp:name "Leviathan"@en ; owl:sameAs wikidata:Q104417057 . @prefix dbpedia-he: . dbr:APT40 owl:sameAs dbpedia-he:Leviathan . @prefix ns16: . dbr:APT40 owl:sameAs ns16:Forzx , dbr:APT40 . @prefix prov: . dbr:APT40 prov:wasDerivedFrom ; dbo:type dbr:Advanced_persistent_threat ; dbp:type dbr:Advanced_persistent_threat ; foaf:isPrimaryTopicOf wikipedia-en:APT40 ; dbp:formerly "Kryptonite Panda"@en , "GreenCrash"@en , "Bronze Mohawk"@en , "APT40"@en , "Temp.Jumper"@en , "Gadolinium"@en , "Leviathan"@en , "Hellsing"@en , "TEMP.Periscope"@en , ""@en ; dbo:alternativeName "Gadolinium"@en , "Hellsing"@en , "APT40"@en , "Kryptonite Panda"@en , "TEMP.Periscope"@en , "Bronze Mohawk"@en , "GreenCrash"@en , "Leviathan"@en , "Temp.Jumper"@en ; dbo:parentOrganisation ; dbp:purpose dbr:Cyberespionage ; dbo:purpose "Cyberespionage," ; dbp:formation 2009 ; dbo:regionServed dbr:China ; dbp:parentOrganization ; dbo:language dbr:Chinese_language ; dbo:headquarter dbr:Hainan_Province ; dbp:headquarters dbr:Hainan_Province ; dbp:methods "Malware, Zero-days, Phishing, backdoor (computing), RAT, Keylogging"@en ; dbp:region dbr:China . dbr:Periscope_Group dbo:wikiPageWikiLink dbr:APT40 ; dbo:wikiPageRedirects dbr:APT40 .
  NODES