{"entities":{"Q4745":{"pageid":27864,"ns":120,"title":"Item:Q4745","lastrevid":88192,"modified":"2020-06-11T07:51:10Z","type":"item","id":"Q4745","labels":{"en":{"language":"en","value":"Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data"}},"descriptions":{"en":{"language":"en","value":"Anomali's report published in June 2020"}},"aliases":{},"claims":{"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://www.anomali.com/blog/anomali-threat-research-identifies-fake-covid-19-contact-tracing-apps-used-to-monitor-devices-steal-personal-data","type":"string"},"datatype":"url"},"type":"statement","id":"Q4745$E9672DD8-1646-459E-A14A-9EB9B7762715","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4138,"id":"Q4138"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4745$e97f65c0-4936-e97c-cbaa-d06aae358a7f","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4209,"id":"Q4209"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4745$1def9488-4857-a806-dfae-1a65944cfb9e","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4418,"id":"Q4418"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4745$5eb0c5db-4685-1127-6ce5-7c22e4838ce2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4714,"id":"Q4714"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4745$5dc104fa-4da3-eb46-1f9d-928441c5b338","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2020-06-10T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4745$bc02a120-4644-bc8c-d905-cb9e9688fdac","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals  a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4745$7af29227-4c67-41fc-7010-848056e642bd","rank":"normal"}]},"sitelinks":{}}}}