Numbered Panda (original) (raw)

About DBpedia

Numbered Panda (also known as IXESHE, DynCalc, DNSCALC, and APT12) is a cyber espionage group believed to be linked with the Chinese military. The group typically targets organizations in East Asia. These organizations include, but are not limited to, media outlets, high-tech companies, and governments. Numbered Panda is believed to have been operating since 2009. However, the group is also credited with a 2012 data breach at the New York Times. One of the group's typical techniques is to send PDF files loaded with malware via spear phishing campaigns. The decoy documents are typically written in traditional Chinese, which is widely used in Taiwan, and the targets are largely associated with Taiwanese interests. Numbered Panda appears to be actively seeking out cybersecurity research relat

thumbnail

Property Value
dbo:abstract Numbered Panda (also known as IXESHE, DynCalc, DNSCALC, and APT12) is a cyber espionage group believed to be linked with the Chinese military. The group typically targets organizations in East Asia. These organizations include, but are not limited to, media outlets, high-tech companies, and governments. Numbered Panda is believed to have been operating since 2009. However, the group is also credited with a 2012 data breach at the New York Times. One of the group's typical techniques is to send PDF files loaded with malware via spear phishing campaigns. The decoy documents are typically written in traditional Chinese, which is widely used in Taiwan, and the targets are largely associated with Taiwanese interests. Numbered Panda appears to be actively seeking out cybersecurity research relating to the malware they use. After an Arbor Networks report on the group, FireEye noticed a change in the group's techniques to avoid future detection. (en)
dbo:battle dbr:Operation_Clandestine_Fox dbr:Operation_Double_Tap
dbo:country dbr:People's_Republic_of_China
dbo:militaryBranch dbr:People's_Liberation_Army
dbo:role Electronic warfare Cyber warfare
dbo:thumbnail wiki-commons:Special:FilePath/China_Emblem_PLA.svg?width=300
dbo:type dbr:Cyber_force dbr:Advanced_persistent_threat
dbo:wikiPageExternalLink https://attack.mitre.org/wiki/Software/S0015
dbo:wikiPageID 53787084 (xsd:integer)
dbo:wikiPageLength 10831 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1101391930 (xsd:integer)
dbo:wikiPageWikiLink dbr:Premier_of_the_People's_Republic_of_China dbr:Private_network dbr:Electronic_warfare dbr:Encryption dbr:Base64 dbr:Bi-directional_text dbr:Hypertext_Transfer_Protocol dbr:People's_Liberation_Army dbr:Remote_Shell dbr:Cyber_espionage dbr:Cyber_force dbr:Unicode dbr:Uniform_Resource_Identifier dbr:Computer_security dbr:CrowdStrike dbr:Communications_protocol dbr:The_New_York_Times dbc:Cyberwarfare dbr:Arbor_Networks dbr:Arms_industry dbr:Phishing dbr:Port_(computer_networking) dbr:Traditional_Chinese_characters dbr:Trend_Micro dbr:Wen_Jiabao dbr:Domain_name dbr:Cyberwarfare_in_China dbr:Adobe_Acrobat dbr:Adobe_Flash_Player dbc:Electronic_warfare dbr:East_Asia dbr:FireEye dbr:POST_(HTTP) dbr:Proxy_server dbr:Japan dbr:Portable_Document_Format dbc:Chinese_advanced_persistent_threat_groups dbc:Espionage dbr:Advanced_persistent_threat dbr:Taiwan dbr:BIOS dbr:Microsoft_Excel dbr:Microsoft_Word dbr:NetBIOS dbr:Operating_system dbr:RC4 dbr:Command_and_control_(malware) dbr:IP_address dbr:Malware dbr:Operation_Clandestine_Fox dbr:Operation_Double_Tap dbr:File:China_Emblem_PLA.svg
dbp:battles * Operation Double Tap * Operation Clandestine Fox (en)
dbp:branch 23 (xsd:integer)
dbp:role dbr:Cyberwarfare_in_China Electronic warfare (en)
dbp:type dbr:Cyber_force Advanced persistent threat (en)
dbp:unitName Numbered Panda (en)
dbp:wikiPageUsesTemplate dbt:CVE dbt:Flag dbt:Infobox_military_unit dbt:Primary_sources dbt:Reflist dbt:Hacking_in_the_2010s
dcterms:subject dbc:Cyberwarfare dbc:Electronic_warfare dbc:Chinese_advanced_persistent_threat_groups dbc:Espionage
rdf:type owl:Thing schema:Organization dul:Agent dul:SocialPerson dbo:Agent wikidata:Q176799 wikidata:Q24229398 wikidata:Q43229 dbo:MilitaryUnit dbo:Organisation
rdfs:comment Numbered Panda (also known as IXESHE, DynCalc, DNSCALC, and APT12) is a cyber espionage group believed to be linked with the Chinese military. The group typically targets organizations in East Asia. These organizations include, but are not limited to, media outlets, high-tech companies, and governments. Numbered Panda is believed to have been operating since 2009. However, the group is also credited with a 2012 data breach at the New York Times. One of the group's typical techniques is to send PDF files loaded with malware via spear phishing campaigns. The decoy documents are typically written in traditional Chinese, which is widely used in Taiwan, and the targets are largely associated with Taiwanese interests. Numbered Panda appears to be actively seeking out cybersecurity research relat (en)
rdfs:label Numbered Panda (en)
owl:sameAs wikidata:Numbered Panda https://global.dbpedia.org/id/2ovwy
prov:wasDerivedFrom wikipedia-en:Numbered_Panda?oldid=1101391930&ns=0
foaf:depiction wiki-commons:Special:FilePath/China_Emblem_PLA.svg
foaf:isPrimaryTopicOf wikipedia-en:Numbered_Panda
foaf:name Numbered Panda (en)
is dbo:wikiPageRedirects of dbr:APT12 dbr:APT_12
is dbo:wikiPageWikiLink of dbr:Chinese_intelligence_activity_abroad dbr:Advanced_persistent_threat dbr:APT12 dbr:APT_12
is foaf:primaryTopic of wikipedia-en:Numbered_Panda