{"id":281,"date":"2019-05-30T14:09:07","date_gmt":"2019-05-30T12:09:07","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=281"},"modified":"2019-09-23T13:43:07","modified_gmt":"2019-09-23T11:43:07","slug":"leviathan-geostrategy-and-ttp-technical-tactics-and-procedures","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/leviathan-geostrategy-and-ttp-technical-tactics-and-procedures\/","title":{"rendered":"Leviathan: Geostrategy and TTP (Tactics, Techniques and Procedures)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Executive summary<\/strong>:<\/h2>\n\n\n\n<p>FireEye posted a\nrelevant report regarding one of the most active threat groups; Leviathan, also\nknown as TEMP, Periscope or TEMP.Jumper. This APT is supposedly attributed to\nthe Chinese government ([1]). In this report\nis shown how involved the cyber threat groups are in the geostrategy of\ncountries.<\/p>\n\n\n\n<p>China is the main\nsupplier of Europe in several products. Approximately since 2009, China has\naimed to build up a maritime route known as OBOR (One Belt, One Road). The main\ngoal of this project is to develop a safe trading corridor to export Chinese\nproducts to all European countries in a fluid way with lower international tax.\nHowever, the geostrategic trouble begins in the South Chinese Sea as there are\nmany bordering countries which are trying to control the area by carrying out\nmilitary operations with their navy forces. This fact poses a major threat for\nthe effectiveness of the OBOR route. Presumably, to afford the conflict China has\ndesigned a strategic plan to quickly develop its navy to become one of the most\nimportant in the world. <\/p>\n\n\n\n<p>Leviathan has carried out several cyberattacks against the following countries: Cambodia, Belgium, Germany, Hong Kong, Phillipine Islands, Malaysia, Norway, Saudi Arabia, Switzerland and the United States. All of these countries are involved in the OBOR route. The fields of the organizations which have been cyber attacked by Leviathan belong to the logistic, engineering, naval technology and naval defense industry ([1]).&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Geostratic analysis of the APT 40 campaign: <\/strong><\/h2>\n\n\n\n<p>Currently, there are relevant military tensions at the beginning of the route. In geostrategic terms, the Paracelso and Spratlkly Islands are key points for China and the surrounding countries to guarantee the normal vessel traffic inside the OBOR route ([11]). If a country blocked the traffic of this area, the negative consequences for the Chinese and the world\u2019s economy would be considerably dangerous. A general map of the whole OBOR route and all the ports involved is shown below ([9]).<\/p>\n\n\n\n<p>As\ncan be seenin the graph above, currently the most desired route for the Chinese\ngovernment is by crossing the South Sea through the Malacca Channel, Arabic Sea\nto the Suez Canal to end in the Port of Piraeus. <\/p>\n\n\n\n<p>The main diplomatic conflicts in the OBOR route are among United States, Malaysia, Taiwan, Vietnam, Japan, Indonesia and the Philippine Islands ([12]). The following map shows the specific areas that are diplomatically confronted with China and the rest of the countries mentioned before. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/cao-2.jpg\" alt=\"\" class=\"wp-image-371\" width=\"677\" height=\"270\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-2.jpg 750w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-2-300x120.jpg 300w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:15px;text-align:center\"><em>Illustration 1: OBOR Route<\/em><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/cao-3-1.jpg\" alt=\"\" class=\"wp-image-388\" width=\"530\" height=\"577\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-3-1.jpg 570w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-3-1-276x300.jpg 276w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:15px;text-align:center\"><em>Illustration 2: International waters claimed by countries. <\/em><\/p>\n\n\n\n<p>In this APT 40 or Leviathan campaign, the countries that received cyberattacks were USA, Malaysia, Cambodia, Brunei, Philippine Islands and Hong Kong. The relation among the States involved in this geostrategic conflict in the Chinese Sea and the organizations that have been targeted by APT 40 is highly strong. Moreover, it is important to mention that Saudi Arabia, Germany, Norway and UK has been targeted by Leviathan ([1]).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/cao-414.png\" alt=\"\" class=\"wp-image-387\" width=\"325\" height=\"335\"\/><\/figure><\/div>\n\n\n\n<p style=\"font-size:15px;text-align:center\"><em>Illustration 3: SouthEast countries targeted by Leviathan<\/em><\/p>\n\n\n\n<p>APT 40 has designed\nand carried out this campaign with the main goal of collecting classified\ninformation from navy and defense organizations. With this classified\ninformation, China, supposedly expects to develop its navy infrastructure to\nreach its aim of becoming a significant military power with high competencies\nin \u201cblue waters\u201d or oceanic waters ([13]).&nbsp; <\/p>\n\n\n\n<p> The following graph shows the evolution of the Chinese naval military development. As it is shown, in the last 20 years the Chinese Army has exponentially developed their military tools and navy resources ([10]). China is trying to be efficient and competitive in military terms as the United States. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/cao-5-2-1024x538.png\" alt=\"\" class=\"wp-image-395\" width=\"538\" height=\"282\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-5-2-1024x538.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-5-2-300x158.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-5-2-768x403.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-5-2.png 1200w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:15px;text-align:center\"><em>Illustration 4: Comparison between the US military resources and the Chinese military resources.<\/em><\/p>\n\n\n\n<p>FireEye considers that presumably, Leviathan is an APT associated to the Chinese government and its main task and duties are focused on carrying out cyber-attacks to collect classified information. Among some of the evidence collected to conclude the attribution of this campaign was the Chinese time zone (UTC+8), as the majority of the operations were executed in this gap of time. Whois&#8221; data has also been collected from the domains suggesting that the infrastructure is located in China.  Futhermore, some APT 40 IP have been identified and localized in China as <a>112.66.188[.]28<\/a> which is associated with a Chinese VPN. As can be seen in the following graph, this address is connected to a Chinese server from Telecom located in Haian. Although the geolocation of that kind of service and the location of an IP is not a determinant element to get an attribution, in this case there is another fact that reinforces the theory that China carried out the cyberattacks. It is important to mention that the Command and Control that was intercepted by FireEye was configured in Chinese. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/8682AAB1-416D-4FB6-B739-89D65CE1008B.jpg\" alt=\"\" class=\"wp-image-398\" width=\"961\" height=\"749\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/8682AAB1-416D-4FB6-B739-89D65CE1008B.jpg 762w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/8682AAB1-416D-4FB6-B739-89D65CE1008B-300x234.jpg 300w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><\/figure><\/div>\n\n\n\n<p style=\"font-size:15px;text-align:center\"><em>Illustration 5: An\u00e1lisis con maltego de la IP 112.66.160.20<\/em><\/p>\n\n\n\n<p>LIFE CYCLE<\/p>\n\n\n\n<p>In the following part, there is a brief description\nabout each stage followed by this threat group ([1]).<\/p>\n\n\n\n<p>First part of the cyberattack:<\/p>\n\n\n\n<p>Several techniques used in this phase have been\nidentified. However, there are some techniques that have been used in the\nmajority of this campaign\u2019s cases. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Web Shells: In organizations that were previously compromised, usually the threat actors leavesleft the servers infected, just in case they want to exfiltrate more information in the future, as they still guarantee access to the system.<\/li><li>Spear Phishing: The threat group uses phishing emails to targeted organizations. In these campaigns they made use of links to Google drive to download the malware in their spear phishing emails with malicious attachments. In their campaigns they mostly exploited the following vulnerabilities:&nbsp; <\/li><li><\/li><\/ul>\n\n\n\n<p>o&nbsp;&nbsp;&nbsp; CVE-2012-0158 [2]<\/p>\n\n\n\n<p>o&nbsp;&nbsp;&nbsp; CVE-2017-0199 [3]<\/p>\n\n\n\n<p>o&nbsp;&nbsp;&nbsp; CVE-2017-8759 [5]<\/p>\n\n\n\n<p>o&nbsp;&nbsp;&nbsp; CVE-2017-11882 [6]<\/p>\n\n\n\n<p>Process to compromise <\/p>\n\n\n\n<p>When the threat actor has been able to access the\nsystems they would try to get alternative points&nbsp; of access to the organization by expanding\nnew backdoors or collecting user credentials. Specifically, the new backdoors\nused in the organization ([8]):<\/p>\n\n\n\n<p>China Chopper: Web Shell that is able to\nexecute code on compromised computers. This way, attackers\ncan send commands via HTTP POST to infect servers. The\nweb Shell is able to: list directories, access\ndatabases and in general any action allowed by .NET.<\/p>\n\n\n\n<p>Photo (also called: &#8220;dersubi&#8221;): A DLL that is\nthe backdoor, this one has the following\ncapabilities:<\/p>\n\n\n\n<p>\u25aa Listing directories, files and storage.<\/p>\n\n\n\n<p>\u25aa Opening of reverse shells.<\/p>\n\n\n\n<p>\u25aa Taking screenshots, video and audio recording.<\/p>\n\n\n\n<p>\u25aa Processing creation<\/p>\n\n\n\n<p>\u25aa Modifying registry keys.<\/p>\n\n\n\n<p>\u25aa Keylogging<\/p>\n\n\n\n<p>\u25aa Modifying\nfiles.<\/p>\n\n\n\n<p>Badflick: Backdoor with the ability to modify the file\nsystem, open reverse shells and modify the configuration of the C2.<\/p>\n\n\n\n<p>Airbreak (also called &#8220;Orz&#8221;): Malware which\nwas programmed in JavaScript, with the capability\nto receive commands to execute from legitimate pages ([7]).<\/p>\n\n\n\n<p>Beacon: It is a malware\ndistributed by the Cobalt Strike platform. This malware is\nable to inject and execute codes and\nexfiltrate files.<\/p>\n\n\n\n<p>The group usually collects corporate VPN credentials,\nas well as other remote administration services (see: SSH, RDP, etc.)<\/p>\n\n\n\n<p>Escalation of privileges:<\/p>\n\n\n\n<p>As in the previous stage, the group uses different\ntools and techniques to carry out &nbsp;the privilege escalation. In\nthis stage, the group mainly focuses on collecting credentials\nfrom both open and private sources, passwords and\nhashes.<\/p>\n\n\n\n<p>We could expect the use of tools like HOMEFRY,\na tool based on Badflick and Airbreak with the ability to obtain and crack\npasswords. As well as the use of native legitimate tools\nsuch as Windows Credential Editor or ProcDump.<\/p>\n\n\n\n<p>Internal recognition:<\/p>\n\n\n\n<p>Leviathan collects passwords to access other computers in the network. Moreover, the attackers take advantage of the native services of the system that would be activated by (RDP, SSH, etc.). Specifically, some of the TTPs associated with this stage would be:<\/p>\n\n\n\n<p>\u2022 MURKYSHELL: malware capable of scanning ports and\nnetwork enumerations.<\/p>\n\n\n\n<p>\u2022 Use of native Windows tools such as net.exe<\/p>\n\n\n\n<p>\u2022 Use of web shells in the internal network, as\ninternal servers usually are less secure than external\nservers.<\/p>\n\n\n\n<p>Lateral movement:<\/p>\n\n\n\n<p>This stage is based on the information gathered in the\nprevious stages. Leviathan is accustomed to using its own scripts, web shells\nand accessible services of the computers in the network. For each compromised computer,\nthe group usually executes a malware and performs new procedures\nof information recognition and theft tasks.<\/p>\n\n\n\n<p>Use of native tools such as at.exe (Task Scheduler)\nand net.exe (network resource management tool)<\/p>\n\n\n\n<p>MURKYTOP: Command line tool for equipment recognition ([8]).<\/p>\n\n\n\n<p>DISHCLOTH: Brute force tool to attack different\nservices.<\/p>\n\n\n\n<p>Persistence:<\/p>\n\n\n\n<p>Leviathan uses backdoors and web shells to maintain\npersistence.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Some of the tools used in the previous phases\nalso serve this purpose. Use of Web Shells as China Chopper.<\/li><\/ul>\n\n\n\n<p>\u2022 Use of detection evasion techniques generating innocuous\ntraffic.<\/p>\n\n\n\n<p>\u2022 Use of TCP ports 80 and 443.<\/p>\n\n\n\n<p>Exfiltration :<\/p>\n\n\n\n<p>The threat group uses compressing\ntools to encrypt the information before exfiltrating\nit. Moreover, the group develops its own tools to properly\ncarry out y this stage.<\/p>\n\n\n\n<p>The following graph, provides the different tools used by the group throughout its life cycle.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"585\" src=\"https:\/\/lab52.es\/blog\/wp-content\/uploads\/2019\/05\/cao-77.png\" alt=\"\" class=\"wp-image-377\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-77.png 779w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-77-300x225.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/05\/cao-77-768x577.png 768w\" sizes=\"(max-width: 779px) 100vw, 779px\" \/><figcaption> Illustration 6: Malware used by Leviathan in each phase. FireEye <br><\/figcaption><\/figure><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">MITRE ATT&amp;CK TTP Matrix:<\/h1>\n\n\n\n<p>The table below shows the TTP and Framework ATT&amp;CK of MITRE ([4]):<\/p>\n\n\n\n<table class=\"wp-block-table aligncenter is-style-regular\"><tbody><tr><td><strong>Domain<\/strong><\/td><td><strong>ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Description<\/strong><\/td><\/tr><tr><td>Enterprise<\/td><td>T1078<\/td><td>Valid Accounts<\/td><td>The group uses valid accounts to access to VPN, SSH and RDP services.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1192<\/td><td>SpearPhishing Link<\/td><td>Leviathan uses Google Drive links in their Spear-phishing campaigns.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1193<\/td><td>SpearPhishing Attachment<\/td><td>Leviathan spear-phishing emails typically leverage malicious attachments.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1189<\/td><td>Drive by Compromise<\/td><td>Leviathan usually compromises strategic websites and the group also relies on multiple web shells.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1059<\/td><td>Command-Line Interface<\/td><td>Leviathan uses different command line tools, like net.exe or MURKYTOP.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1064<\/td><td>Scripting<\/td><td>Leviathan uses custom scripts for internal reconnaissance and lateral movement.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1053<\/td><td> <br>Scheduled Task <\/td><td>Leviathan uses at.exe for lateral movement<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1100<\/td><td> Web Shell <\/td><td>Leviathan relies on web shells such as China chopper.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1110<\/td><td>Brute Force  <\/td><td>Leviathan uses custom brute force tools as DISHCLOTH.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1003<\/td><td> Credential Dumping <\/td><td>Leviathan uses a mix of credential harvesting tools and password dumpers like Windows Credential Editor or their malware HOMEFRY.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1081<\/td><td>Credential in Files<\/td><td>Leviathan uses a mix of credential harvesting tools and password dumpers like Windows Credential Editor or their malware HOMEFRY.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1046<\/td><td>Network Service Scanning<\/td><td>Leviathan uses MURKYSHELL and net.exe for network service scanning.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1210<\/td><td>Explotation of Remote Service<\/td><td>Leviathan usually compromises internal servers with known vulnerabilities.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1076<\/td><td>Remote Desktop Protocol<\/td><td>Leviathan leverages RDP for lateral movement.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1021<\/td><td>Remote Service<\/td><td>Leviathan leverages RDP and SSH to facilitate internal reconnaissance.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1002<\/td><td>Data Compressed<\/td><td>Leviathan uses rar.exe to compress and encrypt files.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1022<\/td><td>Data Encrypted<\/td><td>Leviathan uses rar.exe to compress and encrypt files.<\/td><\/tr><tr><td> <br>Enterprise <\/td><td>T1043<\/td><td>Commonly Used Port<\/td><td>Leviathan uses mainly the TCP ports 80 and 443 for communications with their C2. <\/td><\/tr><\/tbody><\/table>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusions<\/strong>:<\/h2>\n\n\n\n<p>The\ngovernment of China is presumably using APT 40 to collect classified\ninformation from the governments that are involved in the OBOR route against\nthe Chinese international policies. <\/p>\n\n\n\n<p>As\nwe can see the defense industry is an important target for APT 40\nas China aimed to grow and develop its defense resources to become one of the\nmost important maritime army of the world. All the\nsuppliers related with the defense industry should be aware that they would be\nan important target for APT 40 as well. The threat group would cyberattack the defense\nsuppliers with the purpose of compromising the final defense organization. <\/p>\n\n\n\n<p>Currently, for China and the rest of the countries with economies completely focused on exportations, it is highly important to keep the OBOR route under control of non-incidents as 80% of international trading is carried out by vessels.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>References<\/strong>:<\/h2>\n\n\n\n<p>[1] <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/03\/apt40-examining-a-china-nexus-espionage-actor.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/03\/apt40-examining-a-china-nexus-espionage-actor.html<\/a> <\/p>\n\n\n\n<p>[2] <a href=\"http:\/\/cve.circl.lu\/cve\/CVE-2012-0158\">http:\/\/cve.circl.lu\/cve\/CVE-2012-0158<\/a><\/p>\n\n\n\n<p>[3] http:\/\/cve.circl.lu\/cve\/CVE-2017-0199<\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/\">https:\/\/attack.mitre.org\/matrices\/enterprise\/<\/a><\/p>\n\n\n\n<p>[5] <a href=\"http:\/\/cve.circl.lu\/cve\/CVE-2017-8759\">http:\/\/cve.circl.lu\/cve\/CVE-2017-8759<\/a><\/p>\n\n\n\n<p>[6] <a href=\"http:\/\/cve.circl.lu\/cve\/CVE-2017-11882\">http:\/\/cve.circl.lu\/cve\/CVE-2017-11882<\/a><\/p>\n\n\n\n<p>[7] Same TTP example, carried out by another group  <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/06\/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram\/\">https:\/\/www.welivesecurity.com\/2017\/06\/06\/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram\/<\/a><\/p>\n\n\n\n<p>[8] <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/03\/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/03\/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html<\/a><\/p>\n\n\n\n<p>[9] EOM. (s.f.). Rough waters in the China Sea. (Spanish) <a href=\"https:\/\/elordenmundial.com\/aguas-revueltas-en-el-mar-de-la-china-meridional\/\">https:\/\/elordenmundial.com\/aguas-revueltas-en-el-mar-de-la-china-meridional\/<\/a><\/p>\n\n\n\n<p>[10]<a href=\"https:\/\/assets.bwbx.io\/images\/users\/iqjWHBFdfxIU\/iqLEpwHQiQe0\/v0\/1200x630.png\">https:\/\/assets.bwbx.io\/images\/users\/iqjWHBFdfxIU\/iqLEpwHQiQe0\/v0\/1200&#215;630.png<\/a> <\/p>\n\n\n\n<p>[11] Izquierdo, J. C. (s.f.). China&#8217;s global strategy to defend its interests. (Spanish) <a href=\"http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2019\/DIEEEO04_2019JAVCAR-China.pdf\">http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2019\/DIEEEO04_2019JAVCAR-China.pdf<\/a> <\/p>\n\n\n\n<p>[12]\u00a0 Parra P\u00e9rez, A. (s.f.). The geopolitical game of the new Silk Road in Asia. (Spanish) <a href=\"http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2018\/DIEEEO126_2018AGUPAR-RutaSeda.pdf\">http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2018\/DIEEEO126_2018AGUPAR-RutaSeda.pdf<\/a> <\/p>\n\n\n\n<p>[13] Paino, L. (s.f.). Geopolitics in the Pacific Indian Ocean. (Spanish) <a href=\"http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2018\/DIEEEO59-2018_Indo-Pacifico_NvaChina_LauraPaino.pdf\">http:\/\/www.ieee.es\/Galerias\/fichero\/docs_opinion\/2018\/DIEEEO59-2018_Indo-Pacifico_NvaChina_LauraPaino.pdf<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive summary: FireEye posted a relevant report regarding one of the most active threat groups; Leviathan, also known as TEMP, Periscope or TEMP.Jumper. This APT is supposedly attributed to the Chinese government ([1]). In this report is shown how involved the cyber threat groups are in the geostrategy of countries. China is the main supplier [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-281","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-apts","7":"entry","8":"has-post-thumbnail"},"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Dex","author_link":"https:\/\/lab52.io\/blog\/author\/dex\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":17,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":460,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/281\/revisions\/460"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}