Access to network connections , Physical access to computers
Cyberespionage , Cybersabotage
Business individuals , Diplomatic organizations/embassies
A highly sophisticated APT spying framework first discovered in 2018. It consists of two packages called “Tokyo” and “Yokohama” that contain at least 80 malicious modules. These range from backdoors and loaders, to audio recorders and keyloggers.