{
	"id": "46bd34a1-69b4-4c70-b7c6-e25341f8f02d",
	"created_at": "2026-04-06T00:12:54.191121Z",
	"updated_at": "2026-04-10T03:22:08.598344Z",
	"deleted_at": null,
	"sha1_hash": "3335d62efdd52370c4bb41bbbf8f6dffa9e79bb9",
	"title": "Titan Rain",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 26421,
	"plain_text": "Titan Rain\r\nBy Chris Brook\r\nPublished: 2011-07-01 · Archived: 2026-04-05 20:19:35 UTC\r\nHacks\r\nagainst the Defense Department and other U.S. agencies stretching back to 2003\r\nwere codenamed Titan Rain by investigators. The attacks, which breached\r\nhundreds of networks, including Departments of State, Energy and Homeland\r\nSecurity, were coordinated from Chinese computers, investigators found. Global\r\ndefense contractor Lockheed Martin and NASA were also struck in what many\r\nexperts called an attempt to glean information on U.S. systems.  While it’s usually difficult to locate the\r\ncountry of origin for such attacks, researchers were able to trace them back to\r\nthe Chinese province of Guangdong. However, the individuals behind the operation\r\nremain a mystery to this day.\r\nSource: https://threatpost.com/titan-rain/91835/\r\nhttps://threatpost.com/titan-rain/91835/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://threatpost.com/titan-rain/91835/"
	],
	"report_names": [
		"91835"
	],
	"threat_actors": [],
	"ts_created_at": 1775434374,
	"ts_updated_at": 1775791328,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3335d62efdd52370c4bb41bbbf8f6dffa9e79bb9.pdf",
		"text": "https://archive.orkl.eu/3335d62efdd52370c4bb41bbbf8f6dffa9e79bb9.txt",
		"img": "https://archive.orkl.eu/3335d62efdd52370c4bb41bbbf8f6dffa9e79bb9.jpg"
	}
}