analyst @ nohacky :~/threat-actors $
cat / threat-actors / equation-group
analyst@nohacky:~/equation-group.html
historic profile profile
type nation-state
threat_level critical
status active
origin United States
last_updated 2001-MM-DD
XX
equation-group

Equation Group

also known as: EQGRP NSA TAO (suspected) Equation Team

Equation Group is a highly sophisticated cyber-espionage actor widely believed to be associated with the U.S. National Security Agency’s Tailored Access Operations (TAO). The group is known for extremely advanced malware platforms, firmware-level persistence capabilities, and a long history of strategic intelligence operations against global telecommunications, government, and research targets. — a one or two sentence summary of who this actor is and why they matter.

attributed origin United States
suspected sponsor U.S. intelligence (widely suspected)
first observed 2001
primary motivation Espionage
primary targets Telecommunications, Government, Energy, Research
known campaigns Multiple global campaigns
mitre att&ck group G0020
target regions Middle East, Asia-Pacific, Europe, Global
threat level critical

Overview

Equation Group became publicly known in 2015 after a detailed report by Kaspersky Lab that documented one of the most technically advanced cyber-espionage platforms ever observed. Researchers attributed dozens of malware families, covert infrastructure networks, and long-term global intrusions to the group. Their operational history appears to extend back to the early 2000s. The group is notable for engineering capabilities that include custom operating system components, encrypted command‑and‑control frameworks, stealth persistence mechanisms, and firmware implants embedded directly into hard drives. These capabilities place Equation Group among the most sophisticated actors ever documented in cyber operations.

Target Profile

Equation Group operations focus primarily on long-term intelligence collection rather than disruption. Targets typically align with strategic intelligence priorities such as telecommunications infrastructure, nuclear research programs, and government networks.

  • Telecommunications: Global telecom providers have been repeatedly targeted to enable long-term signals intelligence collection and network visibility.
  • Government: Government ministries and diplomatic networks have been targeted for strategic intelligence gathering.
  • Energy & Nuclear Research: Energy infrastructure and nuclear research organizations have been targeted to monitor geopolitical and technological developments.

Tactics, Techniques & Procedures

Documented TTPs based on observed campaigns and public threat intelligence.

mitre id technique description
T1055 Process Injection Equation Group malware frequently injects code into legitimate system processes to evade detection and maintain persistence.
T1547 Boot or Logon Autostart Execution Persistence is achieved through registry modifications, boot mechanisms, and firmware implants embedded in storage devices.
T1105 Ingress Tool Transfer Custom malware modules and reconnaissance tools are transferred into compromised systems after initial access.
T1003 Credential Dumping Credential harvesting enables lateral movement and long‑term privileged access within targeted environments.

Known Campaigns

Confirmed or highly attributed operations linked to this threat actor.

Global Firmware Persistence Operations 2001–2014

Kaspersky reported that Equation Group had the capability to reprogram hard-drive firmware on selected drives, giving the operator unusually durable persistence and covert data storage options.

Post-Stuxnet Reconnaissance and Fanny Activity 2008–2014

Kaspersky linked Equation Group to post-Stuxnet activity in the Middle East, including the Fanny worm and related tooling used against high-value targets, suggesting long-term access and reconnaissance operations.

Shadow Brokers Leak Exposure 2001

The Shadow Brokers group leaked offensive cyber tools believed to originate from Equation Group infrastructure, exposing numerous exploits and operational techniques.

Tools & Malware

Known custom and commodity tools associated with this actor.

  • GrayFish: A sophisticated modular malware platform capable of stealth persistence and encrypted command‑and‑control communication.
  • EquationDrug: A complex espionage framework designed for data collection, command execution, and modular payload deployment.
  • DoubleFantasy: A reconnaissance implant used to validate high‑value targets before deploying more advanced Equation Group malware.

Indicators of Compromise

No static IOC block is included in this profile. Much of the public reporting on Equation Group is historical, and many indicators associated with disclosed tooling are stale, broadly redistributed, or tied to leaked post-compromise frameworks rather than currently attributable infrastructure.

warning

Defenders should rely on behavioral detections, ATT&CK-mapped analytics, and vendor-curated threat intelligence rather than aging public IOCs for this actor.

Mitigation & Defense

Recommended defensive measures for organizations in this actor's target profile.

  • Firmware Integrity Monitoring: Validate firmware integrity for storage devices and network equipment to detect unauthorized modifications.
  • Network Segmentation: Limit lateral movement opportunities by isolating sensitive systems from general enterprise networks.
  • Behavioral Endpoint Monitoring: Use EDR platforms capable of detecting stealth process injection, privilege escalation, and abnormal system behavior.
note

Public attribution to Equation Group is widely tied by researchers to NSA-linked operations, but the U.S. government has not publicly maintained a standard threat-actor profile page for this cluster in the same way commercial intelligence vendors have. This profile therefore uses widely cited third-party research and MITRE ATT&CK for naming and TTP mapping.

Sources & Further Reading

Attribution and references used to build this profile.

— end of profile