{"id":10744,"date":"2021-06-16T00:00:00","date_gmt":"2021-06-16T00:00:00","guid":{"rendered":"http:\/\/localhost\/cyber-operations\/redfoxtrot\/"},"modified":"2021-06-16T00:00:00","modified_gmt":"2021-06-16T00:00:00","slug":"redfoxtrot","status":"publish","type":"post","link":"https:\/\/www.cfr.org\/cyber-operations\/redfoxtrot","title":{"rendered":"RedFoxTrot"},"content":{"rendered":"<p>RedFoxTrot, a group associated with PLA Unit 69010, ran a long-term cyber espionage campaign since at least 2014 directed primarily toward countries in Central Asia, as well as Afghanistan, India, and Pakistan. The group is believed to operate out of Xinjiang.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RedFoxTrot, a group associated with PLA Unit 69010, ran a long-term cyber espionage campaign since at least 2014 directed primarily toward countries in Central Asia, as well as Afghanistan, India, and Pakistan. The group is believed to operate out of Xinjiang.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"cyber_operation":[49],"state_sponsor":[30],"victim_category":[63,110,138],"victim_government_response":[],"victim":[4,72,87,96,127,163,188],"class_list":["post-10744","post","type-post","status-publish","format-standard","hentry","category-threat-actor","cyber_operation-espionage","state_sponsor-china","victim_category-government","victim_category-military","victim_category-private-sector","victim-afghanistan","victim-india","victim-kazakhstan","victim-kyrgyzstan","victim-pakistan","victim-tajikistan","victim-uzbekistan"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/comments?post=10744"}],"version-history":[{"count":0,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10744\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/media?parent=10744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/categories?post=10744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/tags?post=10744"},{"taxonomy":"cyber_operation","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/cyber_operation?post=10744"},{"taxonomy":"state_sponsor","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/state_sponsor?post=10744"},{"taxonomy":"victim_category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_category?post=10744"},{"taxonomy":"victim_government_response","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_government_response?post=10744"},{"taxonomy":"victim","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim?post=10744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}