{"id":10394,"date":"2025-10-08T19:54:15","date_gmt":"2025-10-08T19:54:15","guid":{"rendered":"http:\/\/localhost\/cyber-operations\/sharp-panda\/"},"modified":"2025-10-08T19:54:15","modified_gmt":"2025-10-08T19:54:15","slug":"sharp-panda","status":"publish","type":"post","link":"https:\/\/www.cfr.org\/cyber-operations\/sharp-panda","title":{"rendered":"Sharp Panda"},"content":{"rendered":"<p>Previously known for targeting Southeast Asian governments, Sharp Panda (also known as Sharp Dragon) recently began leveraging compromised networks in Southeast Asia to breach governmental organizations in Africa and the Caribbean.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Previously known for targeting Southeast Asian governments, Sharp Panda (also known as Sharp Dragon) recently began leveraging compromised networks in Southeast Asia to breach governmental organizations in Africa and the Caribbean.&nbsp;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"cyber_operation":[],"state_sponsor":[30],"victim_category":[63],"victim_government_response":[186],"victim":[16],"class_list":["post-10394","post","type-post","status-publish","format-standard","hentry","category-threat-actor","state_sponsor-china","victim_category-government","victim_government_response-unknown","victim-barbados"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/comments?post=10394"}],"version-history":[{"count":0,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10394\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/media?parent=10394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/categories?post=10394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/tags?post=10394"},{"taxonomy":"cyber_operation","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/cyber_operation?post=10394"},{"taxonomy":"state_sponsor","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/state_sponsor?post=10394"},{"taxonomy":"victim_category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_category?post=10394"},{"taxonomy":"victim_government_response","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_government_response?post=10394"},{"taxonomy":"victim","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim?post=10394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}