削除された内容 追加された内容
表へ変更
仮リンク化
66行目:
 
== APTグループ ==
{| class="wikitable sortable plainrowheaders" style="font-size:small90%;"
=== 中国 ===
 
{| class="wikitable sortable plainrowheaders" style="font-size:small;"
|-
! 国名
93 ⟶ 91行目:
|-
| ATP10
| {{仮リンク|Red Apollo|en|Red Apollo}}
|
|
|-
| ATP12
| {{仮リンク|Numbered Panda|en|Numbered Panda}}
|
|
133 ⟶ 131行目:
|-
| ATP40
| {{仮リンク|Periscope Group|en|Periscope Group}}
|
|
|-
| ATP41
| {{仮リンク|ダブルドラゴン (ハッカー集団)|en|Double Dragon (hacking group)}}
| Double Dragon
| Winnti Group、Barium、Axiom
| <ref name="fireeye2019">{{cite web|url=https://content.fireeye.com/apt-41/rpt-apt41/ |title=Double Dragon APT41, a dual espionage and cyber crime operation |work=[[FireEye]] |date=2019-10-16 |access-date=2020-04-14 }}</ref><ref>{{cite web |title=Bureau names ransomware culprits |url=https://www.taipeitimes.com/News/taiwan/archives/2020/05/17/2003736564 |date=May 17, 2020 |website=www.taipeitimes.com |publisher=Taipei Times |access-date=22 May 2020}}</ref><ref>{{cite web |last1=Tartare |first1=Mathieu |last2=Smolár |first2=Martin |title=No "Game over" for the Winnti Group |url=https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/ |website=www.welivesecurity.com |date=21 May 2020 |publisher=We Live Security |access-date=22 May 2020}}</ref><ref>{{cite magazine |last1=Greenberg |first1=Andy |title=Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry |url=https://www.wired.com/story/chinese-hackers-taiwan-semiconductor-industry-skeleton-key/ |magazine=Wired |date=August 6, 2020 |access-date=7 August 2020}}</ref>
148 ⟶ 146行目:
|-
|
| {{仮リンク|ハフニウム (ハッカー集団)|en|Hafnium (group)}}
| Hafnium
|
| <ref>{{cite web |last=Naraine |first=Ryan |title=Microsoft: Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group |date=2021-03-02|language=English|url=https://www.securityweek.com/microsoft-4-exchange-server-zero-days-under-attack-chinese-apt-group |website=securityweek.com |publisher=Wired Business Media |access-date=2021-03-03}}</ref><ref>{{cite web |last=Burt|first=Tom |title=New nation-state cyberattacks |date=2021-03-02|language=English|url=https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/ |website=blogs.microsoft.com |publisher=Microsoft |access-date=2021-03-03}}</ref>
154 ⟶ 152行目:
| rowspan="5" | [[イラン]]
| APT33
| {{仮リンク|Elfin Team|en|Elfin Team}}
|
|
|-
| APT34
| {{仮リンク|Helix Kitten|en|Helix Kitten}}
|
|
|-
| APT35
| {{仮リンク|Charming Kitten|en|Charming Kitten}}
|
|
186 ⟶ 184行目:
| rowspan="3" | [[北朝鮮]]
|
| {{仮リンク|Kimsuky|en|Kimsuky}}
|
|
|-
| APT37
| {{仮リンク|Ricochet Chollima|en|Ricochet Chollima}}
|
|
202 ⟶ 200行目:
| rowspan="6" | [[ロシア]]
| APT28
| {{仮リンク|ファンシー・ベア|en|Fancy Bear}}
|
|
|-
| APT29
| {{仮リンク|コージー・ベア|en|Cozy Bear}}
|
|
|-
|
| {{仮リンク|サンドワーム|en|Sandworm (hacker group)}}
| Sandworm
|
|
|-
|
| {{仮リンク|ベルセルク・ベア|en|Berserk Bear}}
|
|
|-
|
| {{仮リンク|FIN7|en|FIN7}}
| FIN7
|
|
245 ⟶ 243行目:
| [[ベトナム]]
| APT32
| {{仮リンク|OceanLotus|en|OceanLotus}}
|
| <ref>{{cite web |last1=Panda |first1=Ankit |title=Offensive Cyber Capabilities and Public Health Intelligence: Vietnam, APT32, and COVID-19 |url=https://thediplomat.com/2020/04/offensive-cyber-capabilities-and-public-health-intelligence-vietnam-apt32-and-covid-19/ |website=thediplomat.com |publisher=The Diplomat |access-date=29 April 2020}}</ref><ref>{{cite news |title=Lined up in the sights of Vietnamese hackers |url=https://web.br.de/interaktiv/ocean-lotus/en/ |first1=Hakan |last1=Tanriverdi |first2=Max |last2=Zierer |first3=Ann-Kathrin |last3=Wetter |first4=Kai |last4=Biermann |first5=Thi Do |last5=Nguyen |publisher=[[Bayerischer Rundfunk]] |date=October 8, 2020 |editor-first=Verena |editor-last=Nierle |editor2-first=Robert |editor2-last=Schöffel |editor3-first=Lisa |editor3-last=Wreschniok |quote=In Bui’s case the traces lead to a group presumably acting on behalf of the Vietnamese state. Experts have many names for this group: APT 32 and Ocean Lotus are best known. In conversations with a dozen of information security specialists, they all agreed that this is a Vietnamese group spying, in particular, on its own compatriots.}}</ref>