ST
Salt Typhoon briefing
China — MSS-linked
nation-state
active
Compromised nine U.S. telecom carriers, breached lawful intercept wiretap systems, and surveilled over a million Americans. The most consequential telecom espionage campaign ever recorded.
expand profile
active since~2019
also known asGhostEmperor, FamousSparrow, UNC2286
primary motivationSignals intelligence / espionage
mitre groupG1045
primary targets
Telecommunications
Government
Satellite comms
University research
typical methods
Router/edge device exploitation (Cisco IOS XE), CALEA wiretap system compromise, persistent multi-year network implants, credential harvesting, living-off-the-land techniques.
view full profile
read nohacky briefing
FB
APT28 / Fancy Bear briefing
Russia — GRU Unit 26165
nation-state
active
Russia's primary offensive cyber unit, active for two decades. Responsible for election interference, NATO targeting, zero-day chaining, and sustained espionage across Europe and North America.
expand profile
active since~2004
also known asSofacy, Strontium, Forest Blizzard, Pawn Storm
primary motivationEspionage / political interference
mitre groupG0007
primary targets
Government
Defense
Political parties
Media
Ukraine
typical methods
Spear-phishing with zero-days, MSHTML/Office exploit chaining, custom implants (PlugX, X-Agent, Sofacy), credential harvesting, supply chain attacks, dual-vector simultaneous campaigns.
view full profile
read nohacky briefing
SS
Scattered Spider briefing
USA / UK — "The Com"
cybercrime
active
English-speaking collective of teens and young adults who social engineer their way past MFA and help desks. Hit MGM, Caesars, Marks & Spencer, Co-op, and Harrods in high-profile operations. Four members were arrested by the UK's National Crime Agency in July 2025 in connection with the UK retail campaign, which caused an estimated £270–440 million in combined losses.
expand profile
active since~2022
also known asUNC3944, Octo Tempest, 0ktapus, Storm-0875
primary motivationFinancial — ransomware / extortion
mitre groupG1015
primary targets
Retail
Hospitality / Casinos
Insurance
Airlines
Tech companies
typical methods
Vishing (help desk social engineering), SMS phishing, SIM swapping, MFA bypass, third-party vendor compromise, DragonForce ransomware deployment, RMM tool abuse.
view full profile
read nohacky briefing
41
APT41 / Silver Dragon briefing
China — MSS-linked
apt
nation-state
active
Dual-track APT running both state espionage and financially motivated cybercrime simultaneously. The Silver Dragon sub-cluster uses Google Drive as covert C2 against government targets across Southeast Asia and Europe.
expand profile
active since~2012
also known asWinnti, Barium, Double Dragon, Bronze Atlas
primary motivationEspionage + financial (dual-track)
mitre groupG0096
primary targets
Government ministries
Healthcare
Telecoms
Video game industry
Supply chain
typical methods
Cloud service C2 (Google Drive, Sheets), supply chain compromise, custom backdoors (KEYPLUG, DUSTPAN), living-off-the-land, software supply chain poisoning, SQL injection.
view full profile
read nohacky briefing
UC
UNC2814 briefing
China — PRC-nexus
apt
nation-state
active
Weaponized Google Sheets as covert C2 infrastructure, operating undetected across 42 countries for nearly a decade. Uses the GRIDTIDE backdoor to spy on telecoms and government networks via trusted cloud services.
expand profile
active since~2016
also known asUNC2814 (unaffiliated cluster)
primary motivationSignals intelligence / espionage
mitre groupUnassigned
primary targets
Telecoms
Government
42 countries
typical methods
Google Sheets as C2 channel, GRIDTIDE custom backdoor, long-term persistent access, blending into legitimate cloud traffic to evade perimeter defenses.
view full profile
read nohacky briefing
DS
Dust Specter briefing
Iran — state-nexus
nation-state
active
Iran-linked APT targeting Iraqi government ministries with AI-assisted malware development. Deployed four previously undocumented families — SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM — in January 2026.
expand profile
active since~2025 (named)
also known asAPT34-adjacent cluster
primary motivationRegional espionage / political intelligence
mitre groupUnassigned
primary targets
Iraqi government
Middle East ministries
typical methods
AI-assisted malware development, ClickFix lures, compromised government domains as delivery infrastructure, multi-stage novel malware chains.
view full profile
read nohacky briefing
G7
GS7 briefing
Brazil — underground markets
cybercrime
active
Financially motivated operator cloning Fortune 500 brand login portals with 98% visual accuracy, harvesting credentials via Telegram bots, and selling persistent RMM-based access to victim networks.
expand profile
active since~2022
also known asOperation DoppelBrand operator
primary motivationFinancial — credential theft / IAB
mitre groupUnassigned
primary targets
Banking / Finance
Insurance
Tech / SaaS
typical methods
Brand spoofing (150+ malicious domains), real-time credential exfiltration via Telegram, RMM tool implants for persistent access, initial access brokerage.
view full profile
read nohacky briefing
RH
RansomHouse briefing
Unknown — Eastern European links
ransomware
active
Data extortion group that steals and threatens to publish sensitive data without always deploying traditional ransomware encryption. Hit healthcare organizations including Greater Pittsburgh Orthopaedic Associates.
expand profile
active since~2022
also known asRansomHouse, MarioLocker (tooling)
primary motivationFinancial — extortion / data sale
mitre groupUnassigned
primary targets
Healthcare
Finance
Critical infrastructure
typical methods
Data exfiltration prior to encryption, double-extortion, exploitation of unpatched vulnerabilities, delayed victim notification, data-leak site publication.
view full profile
read nohacky briefing
U8
UAT-8616 briefing
China — attributed
nation-state
active
Exploited a Cisco SD-WAN CVSS 10.0 zero-day silently for three years before triggering a Five Eyes emergency response and CISA Emergency Directive 26-03. Confirmed critical infrastructure targeting across multiple countries.
expand profile
active since~2023 (confirmed)
also known asUAT-8616
primary motivationEspionage / infrastructure access
mitre groupUnassigned
primary targets
Network infrastructure
Government
Critical infrastructure
typical methods
Zero-day exploitation of Cisco SD-WAN (CVE-2026-20127 / CVSS 10.0), long-term silent persistence, multi-country network infiltration.
view full profile
read nohacky briefing
LZ
Lazarus Group briefing
North Korea — RGB Unit 180
nation-state
active
North Korea's premier cyber unit, responsible for the largest cryptocurrency thefts in history and the Sony Pictures hack. Funds Pyongyang's weapons program through financial cybercrime on a state scale.
expand profile
active since~2009
also known asHidden Cobra, ZINC, Guardians of Peace
primary motivationFinancial (state-directed) + espionage
mitre groupG0032
primary targets
Cryptocurrency exchanges
Financial institutions
Defense contractors
Media
typical methods
Fraudulent IT worker schemes, supply chain attacks on crypto platforms, custom malware (BLINDINGCAN, Manuscrypt), SWIFT banking system fraud, watering hole attacks.
view full profile
read nohacky briefing
VT
Volt Typhoon
China — PLA-linked
nation-state
active
Quietly pre-positions inside U.S. critical infrastructure — power grids, water systems, and communications — for potential disruptive action in a Taiwan conflict scenario. Lives entirely off the land.
expand profile
active since~2021
also known asBronze Silhouette, Dev-0391, Vanguard Panda
primary motivationPre-positioning for future disruption
mitre groupG1017
primary targets
Power / Energy
Water / Utilities
Communications
Transportation
typical methods
100% living-off-the-land (no custom malware), SOHO router compromise for proxy infrastructure, LOTL commands, Cisco and Fortinet edge device exploitation, years-long silent persistence.
view full profile
LB
LockBit
Russia — RaaS operation
ransomware
disrupted
Once the world's dominant RaaS operation, responsible for more attacks than any other group in 2022–2024, including Boeing, the Royal Mail, and the Industrial and Commercial Bank of China. Operation Cronos in February 2024 seized infrastructure, servers, and source code, severely degrading the operation. LockBit 5.0 re-emerged at reduced scale in late 2025 but has not recovered its former dominance.
expand profile
active since~2019 (disrupted Feb 2024; partial re-emergence late 2025)
also known asABCD ransomware (original), LockBit 2.0/3.0/4.0/5.0
primary motivationFinancial — RaaS model
mitre groupG0139
primary targets
Healthcare
Finance
Manufacturing
Government
Logistics
typical methods
RaaS affiliate model, phishing, RDP brute force, VPN exploitation, double extortion, data-leak site, StealBit exfiltration tool, Cobalt Strike, AV/EDR disabling.
view full profile
CB
APT29 / Cozy Bear
Russia — SVR
nation-state
active
Russia's SVR intelligence cyber unit. Orchestrated the SolarWinds supply chain attack, breached Microsoft's corporate email systems in 2024, and has sustained access to Western government networks for over a decade.
expand profile
active since~2008
also known asMidnight Blizzard, Nobelium, The Dukes, Dark Halo
primary motivationIntelligence collection / espionage
mitre groupG0016
primary targets
Government
Think tanks
Tech vendors
NGOs
Defense
typical methods
Supply chain compromise (SolarWinds SUNBURST), OAuth token theft, password spraying, spear-phishing, custom implants (WellMess, MagicWeb), extreme operational patience and stealth.
view full profile
SW
Sandworm
Russia — GRU Unit 74455
nation-state
active
Russia's most destructive cyber unit. Knocked out Ukraine's power grid twice, deployed NotPetya ($10B+ in global damage), disrupted the 2018 Winter Olympics, and continues sustained destructive attacks against Ukraine.
expand profile
active since~2009
also known asSeashell Blizzard, Voodoo Bear, TeleBots, Iridium
primary motivationDestructive attacks / sabotage
mitre groupG0034
primary targets
Critical infrastructure
Energy / Power grids
Ukraine (ongoing)
Global supply chain
typical methods
Wiper malware (NotPetya, Industroyer, CaddyWiper), ICS/SCADA exploitation, spear-phishing, supply chain poisoning (M.E.Doc), VPNFilter botnet, Sandworm-specific toolchain.
view full profile
BC
BlackCat / ALPHV
Russia — RaaS operation
ransomware
inactive
Sophisticated Rust-based ransomware that hit MGM Resorts, Change Healthcare (causing nationwide pharmacy disruptions), and Caesars. FBI disrupted the operation in December 2023. In March 2024 the group pulled an exit scam after the Change Healthcare attack — pocketing an alleged $22 million ransom and cheating their own affiliate — then announced a shutdown. As of early 2025, the group has apparently disappeared entirely.
expand profile
active since~2021
also known asALPHV, Noberus, UNC4466
primary motivationFinancial — RaaS / extortion
mitre groupG1006
primary targets
Healthcare
Finance
Hospitality
Critical infrastructure
typical methods
Rust-based cross-platform ransomware, triple extortion, Azure AD exploitation, ExMatter exfiltration tool, affiliate model with 80/20 revenue split, advertising on criminal forums.
view full profile
CL
Cl0p
Russia / Ukraine — TA505 affiliated
ransomware
active
Specializes in mass exploitation of zero-days in widely used enterprise file transfer software — MOVEit, GoAnywhere, and Accellion — hitting hundreds of organizations in single campaigns without deploying traditional ransomware.
expand profile
active since~2019
also known asTA505, FIN11, Lace Tempest
primary motivationFinancial — mass extortion
mitre groupG0154
primary targets
File transfer platforms
Finance
Healthcare
Government
typical methods
Zero-day exploitation of MFT platforms (MOVEit CVE-2023-34362, GoAnywhere), SQL injection, automated mass data exfiltration, extortion without encryption, coordinated disclosure to journalists.
view full profile
OR
APT34 / OilRig
Iran — MOIS-linked
nation-state
active
Iran's primary cyber espionage unit targeting Middle Eastern governments, critical infrastructure, and financial institutions. Closely related to Dust Specter activity and has operated against Iraqi government infrastructure since 2024.
expand profile
active since~2014
also known asHelix Kitten, IRN2, Cobalt Gypsy, EUROPIUM
primary motivationEspionage / regional geopolitics
mitre groupG0049
primary targets
Middle East governments
Energy / Oil & Gas
Finance
Telecoms
typical methods
Spear-phishing with custom implants (Veaty, Spearal, QUADAGENT), DNS tunneling C2, credential harvesting, compromised government domains as delivery infrastructure.
view full profile
KM
Kimsuky
North Korea — RGB
nation-state
active
North Korean intelligence collection unit that impersonates journalists, academics, and policy experts to harvest geopolitical intelligence on South Korea, the U.S., and nuclear policy makers worldwide.
expand profile
active since~2012
also known asVelvet Chollima, Black Banshee, Thallium, APT43
primary motivationIntelligence collection / espionage
mitre groupG0094
primary targets
Government / Policy
Think tanks
Nuclear research
South Korea
typical methods
Persona-based social engineering, spear-phishing using legitimate email services, BabyShark / AppleSeed malware families, credential theft from cloud services, document-based exploits.
view full profile
F7
FIN7
Russia / Ukraine — organized crime
cybercrime
active
One of the most sophisticated financially motivated criminal groups in the world. Stole over $3 billion from restaurants, retail, and hospitality companies through POS malware and evolved into ransomware operations via BlackMatter and DarkSide.
expand profile
active since~2015
also known asCarbanak Group, Navigator Group, ITG14
primary motivationFinancial — fraud / ransomware
mitre groupG0046
primary targets
Retail / Restaurants
Hospitality
Finance
Technology
typical methods
Spear-phishing, POS malware (Carbanak), fake IT front companies, USB drops, POWERTRASH fileless malware, Cobalt Strike, evolved to operating BlackMatter/DarkSide RaaS infrastructure.
view full profile
CK
Charming Kitten / APT42
Iran — IRGC-linked
nation-state
active
Iran's IRGC cyber unit specializing in social engineering of journalists, academics, human rights workers, and dissidents. Implicated in interference with the 2024 U.S. presidential election via the Trump campaign breach.
expand profile
active since~2014
also known asPhosphorus, TA453, Mint Sandstorm, Ajax Security
primary motivationEspionage / political surveillance
mitre groupG1044
primary targets
Journalists
Academics
Dissidents
Political campaigns
Nuclear researchers
typical methods
Long-term impersonation campaigns, fake conference invitations, social media persona building, credential phishing, NokNok and POWERSTAR backdoors, mobile device targeting.
view full profile
CK
APT35 / Charming Kitten
Iran — IRGC-linked
nation-state
active
Iranian IRGC-linked cyber espionage group active since at least 2013. Defined by patient, high-touch social engineering — impersonating journalists, academics, and conference organizers over weeks or months before harvesting credentials. Targets journalists, dissidents, academics, government, and defense personnel across the U.S., UK, Israel, and the Middle East.
expand profile
active since~2013
also known asMagic Hound, Phosphorus, Mint Sandstorm, TA453, COBALT ILLUSION, Newscaster, ITG18, CharmingCypress
primary motivationIntelligence collection / espionage
mitre groupG0059
primary targets
Journalists / Media
Academics / Think Tanks
Dissidents / Civil Society
Government / Diplomatic
Defense / Aerospace
Energy / Critical Infrastructure
typical methods
Long-term persona-based social engineering via fake researcher, journalist, and conference organizer identities; credential phishing via lookalike login pages; malicious LNK/ZIP delivery chains (BlackSmith framework, AnvilEcho trojan); rapid exploitation of public PoCs for internet-facing services (Log4Shell, ProxyShell, ManageEngine); post-compromise mailbox delegate access and forwarding rules; LSASS credential dumping with Mimikatz; unmanaged PowerShell (PowerLess, POWERSTAR/CharmPower) to bypass process-name detection.
view full profile
DF
DragonForce
Malaysia — ransomware cartel
ransomware
active
RaaS cartel that emerged as one of the dominant ransomware operations of 2025. Supplied the ransomware payload to Scattered Spider's UK retail campaign against Marks & Spencer, Co-op, and Harrods. Claimed to have absorbed RansomHub in April 2025, converting it into a "cartel" model — a white-label RaaS framework allowing affiliates to operate under their own brands. Attack volume spiked 212% in June 2025.
expand profile
active since~2023
also known asDragonForce Ransomware Cartel
primary motivationFinancial — RaaS model
mitre groupUnassigned
primary targets
Retail
Airlines
Critical infrastructure
Any sector (affiliate-driven)
typical methods
RaaS affiliate cartel model, white-label ransomware-as-a-service for partner groups, double extortion, targeting organizations compromised via social engineering by affiliated actors (Scattered Spider).
view full profile
EQ
Equation Group
USA — NSA/TAO
nation-state
dormant (public)
The NSA's Tailored Access Operations unit, widely considered the most technically advanced threat actor ever documented. Responsible for Stuxnet (with Unit 8200), the HDD firmware implants, and the leaked Shadow Brokers toolset that enabled WannaCry and NotPetya.
expand profile
active since~2001
also known asEQGRP, Tilded Team, NSA TAO
primary motivationSignals intelligence / sabotage
mitre groupG0020
primary targets
Iran (nuclear)
Telecom infrastructure
Adversary governments
typical methods
HDD/SSD firmware implants, Stuxnet co-development, DOUBLEPULSAR/ETERNALBLUE exploits (leaked via Shadow Brokers), supply chain interdiction of hardware shipments, nation-state-grade custom toolchain.
view full profile
EM
Emotet / TA542
Ukraine — organized cybercrime
cybercrime
dormant
Once described by Europol as the world's most dangerous malware botnet — a modular malware distribution service that rented botnet access to ransomware groups including Ryuk and Conti. Repeatedly disrupted by law enforcement and rebuilt. Went silent in April 2023 after Microsoft's macro-blocking policy eliminated its primary delivery mechanism, and no credible activity has been confirmed since. Its eventual return remains a standing concern given its history of adaptation.
expand profile
active since~2014
also known asTA542, Mealybug, Gold Crestwood
primary motivationFinancial — MaaS / botnet rental
mitre groupG0080
primary targets
Any sector (broad)
Finance
Healthcare
Government
typical methods
Email thread hijacking, malicious macro documents, VBScript/PowerShell droppers, modular banking trojan evolved to malware distribution platform, Ryuk/Conti ransomware staging.
view full profile
KN
KillNet
Russia — state-adjacent hacktivism
hacktivism
restructured
Pro-Russian hacktivist collective that launched high-profile DDoS campaigns against NATO member healthcare, government, and airport websites following Russia's 2022 invasion of Ukraine. Announced it had completely disbanded in mid-2023 after founder KillMilk was publicly unmasked. Re-emerged in May 2025 under new leadership and a changed model — pivoting from ideological hacktivism to profit-driven hack-for-hire operations, with analysts assessing the current group as largely a different entity using a familiar brand.
expand profile
active since~2022 (disbanded mid-2023; restructured re-emergence May 2025)
also known asKillNet Collective, Black Skills (2023 rebrand attempt), KillNet 2.0, Deanon Club (current controllers)
primary motivationOriginally pro-Russia political disruption; now assessed as profit-driven hack-for-hire
mitre groupUnassigned
primary targets
NATO governments
Healthcare
Airports
Financial services
typical methods
Coordinated DDoS campaigns via Telegram-recruited volunteers, HTTP flood, DNS amplification, low-sophistication but high-volume disruption operations against publicly accessible web services.
view full profile
EL
Earth Lusca
China — likely state-sponsored
apt
nation-state
active
Prolific Chinese espionage cluster targeting government and critical infrastructure in over 20 countries. Known for exploiting internet-facing applications (Confluence, Exchange, GitLab) and deploying the Cobalt Strike-derived WINNKIT rootkit.
expand profile
active since~2019
also known asTAG-22, CHROMIUM, ControlX
primary motivationEspionage / intelligence gathering
mitre groupG1006
primary targets
Government
Education
Telecoms
Media
20+ countries
typical methods
Exploitation of internet-facing apps (Confluence, Exchange, GitLab CVEs), Cobalt Strike, ShadowPad malware, spear-phishing, watering holes, custom Linux backdoors.
view full profile
I3
INJ3CTOR3 briefing
Unknown — VoIP-focused criminal
cybercrime
active
VoIP-focused criminal operator who exploited a FreePBX zero-day to compromise 900+ phone systems, deploying the multi-stage EncystPHP web shell for persistent access and monetizing stolen dial-out access through international toll fraud.
expand profile
active since~2024
also known asINJ3CTOR3
primary motivationFinancial — VoIP fraud / toll abuse
mitre groupUnassigned
primary targets
VoIP / PBX systems
SMB phone infrastructure
typical methods
Post-auth command injection (CVE-2025-64328), EncystPHP six-stage web shell deployment, timestamp forgery, persistence through patching, international toll fraud monetization.
view full profile
read nohacky briefing
FS
FulcrumSec briefing
Unknown — targeted criminal
cybercrime
active
Targeted the LexisNexis AWS infrastructure via an unpatched React2Shell vulnerability, exfiltrating 3.9 million records including 118 government user profiles and 53 plaintext secrets.
expand profile
active since~2025
also known asFulcrumSec
primary motivationFinancial — data theft / extortion
mitre groupUnassigned
primary targets
Data brokers
Legal / risk intelligence
Cloud infrastructure
typical methods
Exploitation of unpatched CVSS 10.0 vulnerabilities, cloud environment lateral movement, credential reuse, large-scale PII exfiltration.
view full profile
read nohacky briefing
JK
Jinkusu Group briefing
Unknown — PhaaS operator
cybercrime
active
Built and operates Starkiller — a PhaaS platform that proxies real login pages in real time through headless Chrome containers, bypassing MFA by relaying the full authentication flow with Telegram-based analytics.
expand profile
active since~2024
also known asStarkiller PhaaS operator
primary motivationFinancial — PhaaS subscription model
mitre groupUnassigned
primary targets
Any MFA-protected org
Enterprise accounts
Financial services
typical methods
Real-time MFA bypass via adversary-in-the-middle proxy, headless Chrome real-page rendering, Telegram C2 and analytics dashboard, subscription-based PhaaS with tiered pricing.
view full profile
read nohacky briefing
SP
APT10 / Stone Panda briefing
China — MSS-linked operators
nation-state
active
Chinese cyber-espionage group linked to the Ministry of State Security (MSS). Known for long-running intellectual property theft campaigns and the global Cloud Hopper operation targeting managed service providers to gain indirect access to hundreds of corporate networks.
expand profile
active since~2010
also known asStone Panda, Red Apollo, CVNX, MenuPass
primary motivationState espionage / intellectual property theft
mitre groupAPT10
primary targets
Managed Service Providers (MSPs)
Technology
Defense / Aerospace
Pharmaceutical
Telecommunications
Government
typical methods
Supply-chain compromise of managed service providers, spear-phishing campaigns, credential harvesting, lateral movement across enterprise environments, data staging and large-scale intellectual property exfiltration.
***Notable for the “Cloud Hopper” campaign targeting global MSPs to access downstream corporate networks.
view full profile
read nohacky briefing
EC
Evil Corp
Russia — organized cybercrime group
cybercrime
active
Russian cybercrime organization responsible for major banking malware operations and later enterprise ransomware campaigns. Evil Corp initially built global financial theft infrastructure using the Dridex banking trojan before evolving into high-impact ransomware operations such as WastedLocker and Hades targeting large corporations worldwide.
expand profile
active since
~2007
also known as
INDRIK SPIDER, UNC2165, Dridex Group
primary motivation
Financial — banking fraud and ransomware extortion
mitre group
G0102 (Evil Corp)
primary targets
Financial institutions
Retail and e-commerce
Healthcare
Manufacturing
Large enterprise organizations
typical methods
Distribution of banking trojans through phishing and malicious document campaigns, credential harvesting, lateral movement through enterprise networks, and deployment of ransomware families such as WastedLocker and Hades for high-value extortion operations.
***The group gained global notoriety through the Dridex banking trojan campaigns that stole hundreds of millions of dollars from financial institutions worldwide.
view full profile
RV
REvil / Sodinokibi
Russia / Eastern Europe — ransomware ecosystem
cybercrime
active
Financially motivated ransomware operation that operated one of the most prolific ransomware-as-a-service platforms in the world. Known for large-scale double-extortion campaigns and the Kaseya supply-chain attack that impacted hundreds of downstream organizations.
expand profile
active since~2019
also known asSodinokibi, REvil ransomware
primary motivationFinancial — ransomware extortion / data theft
mitre groupUnassigned
primary targets
Managed Service Providers (MSPs)
Enterprise Software
Financial Services
Healthcare
Manufacturing
Government Contractors
typical methods
Ransomware-as-a-service operations, affiliate-based intrusion campaigns, exploitation of enterprise software vulnerabilities, large-scale data exfiltration followed by double-extortion pressure through public leak sites.
***Notable for the 2021 Kaseya VSA supply-chain ransomware attack affecting hundreds of organizations globally.
view full profile
CT
Conti
Russia / Eastern Europe — ransomware ecosystem
cybercrime
dormant
Highly organized ransomware operation that operated one of the most active ransomware-as-a-service ecosystems between 2020 and 2022. Known for large-scale attacks on healthcare, government, and enterprise organizations and for internal operational leaks that exposed the structure of a modern ransomware syndicate.
expand profile
active since~2019
believed inactive since2022
also known asConti ransomware group
primary motivationFinancial — ransomware extortion
mitre groupUnassigned
primary targets
Healthcare
Government
Manufacturing
Financial Services
Critical Infrastructure
Enterprise Networks
typical methods
Affiliate-based ransomware campaigns, spear-phishing and credential harvesting for initial access, exploitation of exposed services such as RDP, rapid lateral movement across enterprise environments, and double-extortion data theft combined with encryption.
***Notable for the 2022 leak of internal Conti chat logs, which exposed operational structures, tooling, and ties to other ransomware groups.
view full profile
DS
DarkSide
Russia / Eastern Europe — ransomware ecosystem
ransomware
dormant
Financially motivated ransomware-as-a-service operation best known for the 2021 Colonial Pipeline attack, which caused widespread fuel disruption across the U.S. East Coast. Combined data theft, affiliate-led intrusions, and public extortion branding in one of the most consequential ransomware campaigns ever recorded.
expand profile
active since~2020
believed dormant since2021
also known asDarkSide ransomware group
primary motivationFinancial — ransomware extortion / data theft
mitre groupUnassigned
primary targets
Energy / Fuel Distribution
Manufacturing
Professional Services
Technology
Enterprise Networks
typical methods
Affiliate-based ransomware intrusions, theft of sensitive data before encryption, double-extortion pressure through leak sites, exploitation of exposed remote access pathways, and rapid enterprise-wide deployment after privilege escalation and lateral movement.
***Best known for the 2021 Colonial Pipeline ransomware incident that triggered emergency response and fuel supply disruption across the eastern United States.
view full profile
BB
Black Basta
Russia / Eastern Europe — ransomware ecosystem
ransomware
active
Highly active ransomware group believed to contain former Conti operators. Known for fast-moving enterprise intrusions and large-scale double-extortion campaigns against critical infrastructure and global corporations.
expand profile
active since~2022
also known asBlack Basta ransomware
primary motivationFinancial — ransomware extortion
mitre groupUnassigned
primary targets
Critical infrastructure
Manufacturing
Healthcare
Technology
typical methods
Phishing and credential theft for initial access, exploitation of exposed VPN and remote services, rapid lateral movement with Cobalt Strike, data exfiltration followed by encryption and leak-site extortion.
view full profile
F12
FIN12
Russia / Eastern Europe — organized cybercrime
cybercrime
active
Financially motivated intrusion group specializing in rapid ransomware deployment following initial access purchases from brokers. Known for targeting healthcare and enterprise organizations with minimal dwell time before encryption.
expand profile
active since~2019
also known asUNC1878
primary motivationFinancial — ransomware operations
mitre groupUnassigned
primary targets
Healthcare
Finance
Enterprise networks
typical methods
Purchasing access from initial access brokers, credential harvesting, rapid privilege escalation, lateral movement, and ransomware deployment with minimal reconnaissance phase.
view full profile
LV
APT40 / Leviathan
China — MSS-linked
nation-state
active
Chinese cyber-espionage group focused on maritime industries, government agencies, and defense contractors across the Indo-Pacific region. Known for exploiting public-facing web applications and leveraging stolen credentials for long-term intelligence collection.
expand profile
active since~2013
also known asLeviathan, TEMP.Periscope, Kryptonite Panda
primary motivationState espionage / maritime intelligence
mitre groupG0065
primary targets
Maritime industry
Defense contractors
Government agencies
Shipbuilding
typical methods
Exploitation of web applications and internet-facing infrastructure, credential theft, web shells, spear-phishing campaigns, and long-term persistence for maritime intelligence gathering.
view full profile
GM
Gamaredon
Russia — FSB-linked
nation-state
active
Russian cyber-espionage group focused almost exclusively on Ukraine. Known for relentless spear-phishing campaigns and rapid malware iteration targeting government and military organizations.
expand profile
active since~2013
also known asPrimitive Bear, ACTINIUM
primary motivationMilitary intelligence
mitre groupG0047
primary targets
Ukrainian government
Military organizations
Critical infrastructure
Law enforcement
typical methods
High-volume spear-phishing campaigns, malicious document lures, custom malware droppers, credential harvesting, and persistent surveillance operations targeting Ukrainian government networks.
view full profile
MW
MuddyWater
Iran — MOIS-linked
nation-state
active
Iranian cyber-espionage group targeting telecommunications providers, government agencies, and defense organizations across the Middle East and Asia.
expand profile
active since~2017
also known asSeedworm, Static Kitten
primary motivationState espionage
mitre groupG0069
primary targets
Telecommunications
Government agencies
Defense contractors
Energy sector
typical methods
PowerShell-based backdoors, spear-phishing campaigns, exploitation of public-facing servers, credential harvesting, and cloud-based command-and-control infrastructure.
view full profile
VM
Void Manticore / Handala briefing
Iran — MOIS-linked destructive operations
nation-state
active
Iranian MOIS-affiliated destructive operations group responsible for wiper attacks, hack-and-leak campaigns, and the March 2026 attack on Stryker Corporation — the largest known wiper operation against a single U.S. company. Operates under multiple hacktivist personas including Handala, Homeland Justice, and Karma.
expand profile
active since~2022
also known asStorm-842, Red Sandstorm, Banished Kitten, COBALT MYSTIQUE, Handala Hack Team, Homeland Justice, Karma
primary motivationDestruction / Sabotage / Influence
mitre groupUnassigned (Storm-842)
primary targets
Government
Healthcare
Critical Infrastructure
Energy
Telecom
typical methods
Custom wiper malware (BiBi, Cl Wiper, Handala Wiper), MDM abuse (Microsoft Intune remote wipe), credential compromise, RDP lateral movement, Group Policy logon script deployment, web shells (Karma Shell), hack-and-leak operations, and coordinated information campaigns via Telegram.
view full profile
read nohacky briefing
RY
Royal
Russia / Eastern Europe — ransomware ecosystem
ransomware
disrupted
Ransomware operation containing former Conti operators, active from late 2022 before rebranding as BlackSuit in mid-2023. Responsible for large-scale attacks against healthcare, manufacturing, and enterprise networks, including the City of Dallas. The FBI and CISA confirmed the BlackSuit rebrand in August 2024. In July 2025, Operation Checkmate seized four servers and nine domains under the BlackSuit name, though no arrests were made.
expand profile
active since~2022 (rebranded BlackSuit mid-2023; disrupted July 2025)
also known asBlackSuit (successor brand), Royal ransomware
primary motivationFinancial extortion
mitre groupUnassigned
primary targets
Healthcare
Manufacturing
Technology
Enterprise infrastructure
typical methods
Phishing-based initial access, credential theft, lateral movement through enterprise networks, data exfiltration prior to encryption, and double-extortion ransomware deployment.
view full profile
VS
Vice Society
Unknown — cybercrime group
ransomware
active
Ransomware group known for targeting educational institutions and public sector organizations with data theft and extortion campaigns.
expand profile
active since~2021
also known asVice Society ransomware
primary motivationFinancial extortion
mitre groupUnassigned
primary targets
Education
Government
Public sector
Healthcare
typical methods
Exploitation of vulnerable servers, credential harvesting, lateral movement using legitimate administrative tools, and ransomware deployment combined with data-leak site extortion.
view full profile
T558
TA558
Latin America — cybercrime operator
cybercrime
active
Large-scale malware distribution operator targeting hospitality and transportation sectors with phishing campaigns delivering remote access trojans.
expand profile
active since~2018
also known asTA558 cluster
primary motivationFinancial cybercrime
mitre groupUnassigned
primary targets
Hospitality
Transportation
Travel services
Corporate users
typical methods
Phishing emails delivering malicious archives, remote access trojans such as Agent Tesla and Remcos, credential harvesting, and large-scale malware distribution campaigns.
view full profile
AN
Anonymous
Global — decentralized hacktivism
hacktivism
active
Loose collective of hacktivists responsible for politically motivated cyber operations including website defacements, DDoS campaigns, and data leaks targeting governments and corporations.
expand profile
active since~2008
also known asAnonymous collective
primary motivationHacktivism / political protest
mitre groupUnassigned
primary targets
Government websites
Corporations
Law enforcement
Political organizations
typical methods
Distributed denial-of-service (DDoS) campaigns, website defacements, data leaks, social media operations, and coordinated hacktivist campaigns organized through online forums.
view full profile
44
DarkHalo
Russia — SVR-linked espionage cluster
nation-state
active
Highly stealthy espionage operator tied to the SolarWinds Orion supply-chain intrusion and selective follow-on compromises against government, technology, and policy-sector targets.
expand profile
active since~2019
also known asUNC2452, SolarStorm
primary motivationStrategic espionage
mitre groupUnassigned
primary targets
Government
Technology
Think tanks
Security vendors
typical methods
Supply-chain compromise, trojanized software updates, cloud and identity abuse, stealthy lateral movement, selective post-exploitation, and long-duration intelligence collection with strong operational security.
view full profile
45
Bronze Starlight
China — suspected state-aligned intrusion cluster
nation-state
active
Chinese intrusion cluster observed using ransomware as cover for broader espionage-oriented access, intrusion operations, and post-compromise activity across multiple sectors.
expand profile
active since~2021
also known asEmperor Dragonfly, DEV-0401
primary motivationEspionage / access operations
mitre groupUnassigned
primary targets
Technology
Manufacturing
Critical sectors
Enterprise networks
typical methods
Rapid exploitation of exposed systems, HUI Loader activity, Cobalt Strike and PlugX deployment, credential theft, persistence, data access, and ransomware used as a diversion or concealment mechanism.
view full profile
46
Storm-0558
China — state-linked cloud intrusion actor
nation-state
active
Cloud-focused espionage operator that abused a stolen Microsoft signing key to forge tokens and access Exchange Online and Outlook email accounts at targeted organizations.
expand profile
active sincePublicly exposed 2023
also known asMicrosoft Storm-0558
primary motivationStrategic espionage
mitre groupUnassigned
primary targets
Government
Diplomatic entities
Cloud tenants
Email systems
typical methods
Cloud identity abuse, forged authentication tokens, unauthorized Exchange Online and Outlook access, targeted mailbox collection, and stealthy access to high-value communications.
view full profile
47
Linen Typhoon briefing
China — state-sponsored espionage group (APT27)
nation-state
active
Long-running Chinese state-backed APT active since at least 2010, targeting government, defense, technology, and human rights organizations worldwide. One of three China-nexus actors confirmed by Microsoft to have exploited the ToolShell SharePoint vulnerability chain in 2025.
expand profile
active since~2010
also known asAPT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, Budworm, TG-3390, UNC215
primary motivationStrategic espionage / intelligence collection
mitre groupG0027
primary targets
Government
Defense
Technology
Human rights orgs
Foreign embassies
typical methods
Drive-by compromise, exploitation of exposed web infrastructure, web shell deployment, spear phishing, credential theft, lateral movement, and long-term stealthy access. In 2025, confirmed to have exploited the ToolShell SharePoint vulnerabilities (CVE-2025-53770 / CVE-2025-53771) to steal MachineKeys and establish persistent access. Two Chinese nationals linked to APT27 operations were indicted by the US in March 2025.
view full profile
read nohacky briefing
48
Violet Typhoon briefing
China — state-sponsored intellectual property theft group (APT31)
nation-state
active
Chinese state-backed APT specializing in intellectual property theft, targeting NGOs, think tanks, media, academia, and former government and military personnel. Confirmed by Microsoft as a ToolShell exploiter in 2025 and previously sanctioned by the US Treasury in connection with APT31 activity.
expand profile
active since~2012–2015
also known asAPT31, Bronze Vinewood, Judgment Panda, ZIRCONIUM, Red Keres, TA412, Sheathminer
primary motivationIntellectual property theft / political espionage
mitre groupG0128
primary targets
NGOs
Think tanks
Media
Higher education
Finance & health
Former gov/military
typical methods
Persistent scanning of exposed web infrastructure, web shell installation via exploited vulnerabilities, targeted spear phishing, and focused collection of competitively sensitive data. In 2025, confirmed exploiting the ToolShell SharePoint vulnerability chain (CVE-2025-53770 / CVE-2025-53771) for MachineKey theft and persistent access. Minimal but noted overlaps with Storm-0558. US Treasury sanctioned Wuhan Xiaoruizhi Science and Technology Company along with two linked individuals as APT31 operators in March 2024.
view full profile
read nohacky briefing
49
Storm-2603 briefing
China — suspected state-aligned ransomware and espionage cluster
nation-state
active
Emerging China-attributed threat cluster combining ransomware deployment with espionage-aligned access operations. First surfaced in March 2025 and confirmed as one of three actors exploiting the ToolShell SharePoint vulnerability chain. Microsoft links the group to LockBit and Warlock ransomware use while noting that its objectives remain difficult to confidently assess.
expand profile
active since~March 2025
also known asCL-CRI-1040 (Palo Alto Unit 42)
primary motivationUnclear — espionage and/or financial gain
mitre groupUnassigned
primary targets
Critical infrastructure
Government
Finance
Healthcare
APAC & LATAM orgs
typical methods
SharePoint ToolShell exploitation (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771) for unauthenticated RCE and MachineKey theft; AK47 C2 framework (multi-protocol DNS and HTTP backdoor); DLL sideloading and DLL hijacking; BYOVD (Bring Your Own Vulnerable Driver) to disable endpoint protections; scheduled task persistence; GPO abuse to distribute Warlock and LockBit Black ransomware; Mimikatz credential dumping; and lateral movement via PsExec and masscan. DNS tunneling via custom dnsclient.exe backdoor. Some infrastructure overlaps with APT27 and APT31 activity clusters.
view full profile
read nohacky briefing
50
China-Nexus Group (Unnamed) briefing
China — unattributed state actor, earliest known ToolShell exploiter
nation-state
active
Unidentified China-nexus threat actor assessed by Mandiant as among the earliest actors to exploit the ToolShell SharePoint vulnerability chain, with activity beginning as early as July 7, 2025 — before public disclosure. Targeted multiple sectors and geographies with a focus on machine key material theft for persistent access. Distinct from the three named actors confirmed by Microsoft.
expand profile
active sinceObserved July 2025 (earliest ToolShell wave)
also known asUnnamed — no public tracking designation assigned
primary motivationEspionage / persistent access
mitre groupUnassigned
primary targets
Government
Technology
Telecommunications
Multiple geographies
typical methods
Early zero-day exploitation of SharePoint ToolShell (CVE-2025-53770 / CVE-2025-53771) prior to public disclosure. Activity centered on stealthy MachineKey material theft — cryptographic secrets that can be used to maintain persistent access to victim environments even after patching. The earliest observed wave (July 17–18, 2025) used in-memory .NET module execution without writing files to disk, consistent with a sophisticated actor prioritizing operational security. Mandiant CTO Charles Carmakal publicly assessed at least one actor in the early exploitation wave as China-nexus on July 22, 2025. The group has not been publicly attributed to a known cluster as of current reporting.
view full profile
read nohacky briefing
SH
ShinyHunters briefing
International — financially motivated cybercrime collective
cybercrime
active
Prolific data theft and extortion group active since 2020 with a confirmed record of breaching more than 60 organizations globally. Known for mass credential harvesting, dark web data sales, and a 2024–2026 pivot to cloud platform extortion targeting Salesforce, Snowflake, and SaaS environments. Closely linked to Scattered Spider and LAPSUS$, and tracked by Google Threat Intelligence as UNC6040 and UNC6240. The Crunchyroll supply chain breach — accessed via a compromised Telus International BPO employee — is among the most recent confirmed operations.
expand profile
active since~2020
also known asShinyCorp, UNC6040, UNC6240, Bling Libra (Palo Alto Unit 42), Sp1d3rHunters (collaborative alias)
primary motivationFinancial — data theft, extortion, dark web sales
mitre groupUnassigned (no formal MITRE G-number as of 2026)
primary targets
E-commerce / Retail
Ticketing / Entertainment
Airlines / Travel
Luxury / LVMH brands
Financial Services
Telecoms
Technology / SaaS
Education
typical methods
Credential phishing via cloned login pages (Okta SSO, Microsoft, Google); vishing (voice phishing) impersonating IT support to obtain OAuth authorization from employees; abuse of Salesforce Data Loader connected app for mass CRM data export; supply chain compromise via BPO/vendor employee credential theft and malware deployment; stolen credential reuse against cloud storage (S3, Snowflake); dark web sale and extortion with "pay or leak" model; BreachForums administration and data brokering; emerging RaaS activity under the shinysp1d3r brand targeting VMware ESXi environments.
view full profile
read nohacky briefing
U6
UNC6395 briefing
Unknown — SaaS supply chain operator; assessed China-nexus by some researchers
cybercrime
active
Threat cluster responsible for the August 2025 Salesloft Drift supply chain breach — one of the largest SaaS supply chain compromises on record, affecting more than 700 organizations. The actor spent months covertly inside Salesloft's GitHub environment before pivoting to Drift's AWS infrastructure to steal OAuth tokens, then systematically queried Salesforce instances across hundreds of enterprises including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, and CyberArk. Primary objective: credential harvesting for downstream access. Attribution remains contested; Google tracks the cluster as UNC6395 while Cloudflare designates it GRUB1.
expand profile
active sinceAt least March 2025 (GitHub dwell); August 2025 (active exfiltration)
also known asGRUB1 (Cloudflare Cloudforce One)
primary motivationCredential harvesting for downstream compromise; possible financial/espionage dual-purpose
mitre groupUnassigned
primary targets
Technology / SaaS vendors
Cybersecurity firms
Financial services
Cloud platforms
Any Salesloft Drift customer
typical methods
Long-dwell GitHub repository compromise (March–June 2025); lateral movement from Salesloft application environment to Drift's AWS infrastructure; OAuth token theft from Drift customer integration store; systematic SOQL query execution against Salesforce objects (Users, Accounts, Cases, Opportunities); Bulk API 2.0 mass data export; deletion of query jobs post-exfiltration to impede detection; routing through Tor exit nodes and VPS providers; targeted credential hunting for AWS access keys, Snowflake tokens, and passwords within exported Salesforce records.
view full profile
read nohacky briefing
QI
Qilin / Agenda briefing
Russia — RaaS operation
ransomware
active
The dominant ransomware group by attack volume in 2025, surpassing 1,000 claimed victims on its leak site before year-end after absorbing RansomHub affiliates. Hit the UK's Synnovis NHS blood-testing service in June 2024, forcing cancellation of over 1,100 surgeries and causing transfusion shortages across London hospitals, and Malaysian Airports Holdings for $10 million. Maintained its leading position into January 2026, accounting for roughly a fifth of all observed ransomware attacks.
expand profile
active since~2022 (as Agenda); rebranded Qilin late 2022
also known asAgenda Ransomware, Water Kryptik (Trend Micro)
primary motivationFinancial — RaaS / double extortion
mitre groupUnassigned (no formal G-number as of 2026)
primary targets
Healthcare
Manufacturing
Government
Education
Financial Services
Professional Services
typical methods
RaaS affiliate model with 80–85% revenue split; stolen credential reuse against VPN and RDP; spear-phishing via MSP ScreenConnect admins for downstream customer compromise; cross-platform Golang and Rust ransomware variants targeting Windows, Linux, and VMware ESXi; WSL abuse to run Linux encryptors on Windows hosts to evade EDR; BYOVD (Bring Your Own Vulnerable Driver) for defense disabling; Chrome credential stealer deployed pre-encryption; Cobalt Strike for lateral movement; VSS backup deletion; WikiLeaksV2 data leak site; partnership with DragonForce and LockBit cartel announced Q3 2025.
view full profile
read nohacky briefing
AK
Akira
Russia — closed RaaS operation
ransomware
active
Persistent RaaS operation active since March 2023, with confirmed ransom proceeds exceeding $244 million USD through late September 2025 per a joint FBI/CISA advisory — spanning its entire operating history. Known for targeting Cisco VPN appliances and deploying a Linux encryptor through an unmonitored IoT webcam to bypass EDR — among the most creative evasion techniques documented that year. CISA and the FBI updated their advisory in November 2025, warning of an imminent threat to critical infrastructure.
expand profile
active since~March 2023
also known asStorm-1567, Howling Scorpius (Palo Alto), Punk Spider (CrowdStrike), Gold Sahara (Secureworks)
primary motivationFinancial — closed RaaS / double extortion
mitre groupG1024
primary targets
Manufacturing
Healthcare
Education
Financial Services
IT / Technology
Food & Agriculture
typical methods
Credential compromise of VPN appliances lacking MFA (Cisco ASA, SonicWall CVE-2024-40766); AnyDesk and LogMeIn for persistence masquerading as admin activity; C++ and Rust (Megazord) dual-encryptor toolchain; ESXi and Nutanix AHV hypervisor targeting; IoT device exploitation (Linux webcam used to mount SMB shares and encrypt files while evading Windows EDR); Conti-lineage tooling and developer overlap; on-chain laundering via Defiway with infrastructure shared with Fog and Frag ransomware clusters; joint CISA/FBI advisory issued November 2025.
view full profile
42
APT42 / Charming Kitten
Iran — IRGC Intelligence Organization
nation-state
active
Iran's premier surveillance unit — not focused on disruption but on identifying and locating dissidents, journalists, and foreign policy figures who oppose the regime. Invests weeks or months cultivating trust before harvesting credentials. Targeted Donald Trump's 2024 presidential campaign and Israeli government officials, and is now actively hunting population-scale datasets from ISPs and telecoms to locate regime opponents.
expand profile
active since~2015
also known asMint Sandstorm / Phosphorus (Microsoft), TA453 (Proofpoint), CALANQUE (Google TAG), Yellow Garuda (PwC), ITG18 (IBM), Crooked Charms
primary motivationSurveillance / dissident tracking / espionage on behalf of IRGC-IO
mitre groupG1044
primary targets
Iranian dissidents / activists
Journalists / Media
Think tanks / NGOs
Government officials
ISPs / Telecoms
Academia
Political campaigns
typical methods
Long-horizon rapport-building via impersonation of journalists, academics, and NGO representatives before introducing malicious links; spear-phishing with typosquatted domains impersonating major news outlets (Washington Post, Jerusalem Post, The Economist); cloud-native attacks against Microsoft 365 and Google Workspace to harvest credentials and exfiltrate email without deploying endpoint malware; MFA bypass by harvesting one-time codes during live phishing sessions; Android mobile spyware (PINEFLOWER) for collecting calls, SMS, and audio from Iran-based dissidents; custom backdoors NICECURL and TAMECAT for targeted post-compromise access; active 2025–2026 focus on ISPs, medical systems, and telecoms holding population-scale individual datasets for dissident location intelligence.
view full profile
PD
PlushDaemon
China — state-aligned APT
apt
active
A previously undocumented China-aligned APT first exposed by ESET in 2025. Specializes in adversary-in-the-middle supply chain attacks — compromising network devices to hijack software update traffic and silently inject the SlowStepper backdoor, a 30+ component surveillance toolkit, into legitimate installer packages.
expand profile
active since~2018–2019 (first documented by ESET January 2025)
also known asPlushDaemon (ESET designation); no cross-vendor alias assigned as of 2026
primary motivationCyberespionage — long-term surveillance of individuals and organizations of strategic interest to Beijing
mitre groupUnassigned
primary targets
South Korea
Taiwan
Hong Kong
United States
New Zealand
Electronics manufacturing
Universities / Academia
typical methods
Supply chain compromise by replacing legitimate VPN and software installers with trojanized versions (IPany VPN, Sogou Pinyin input method); adversary-in-the-middle via EdgeStepper — a Golang ELF implant deployed on routers that intercepts DNS update queries and redirects them to attacker-controlled infrastructure; downloaders LittleDaemon and DaemonicLogistics deploy SlowStepper on target Windows machines; SlowStepper is a 30+ module C++/Python/Go backdoor using DNS tunneling for C2, capable of browser credential theft, keylogging, audio/video surveillance, screenshot capture, and WeChat/Telegram message collection; registry persistence; self-deletion post-exfiltration; strong OPSEC with code stored encrypted on disk.
view full profile
RH
RansomHub
Russia — RaaS operation
ransomware
inactive
Dominated the ransomware landscape through 2024 and into early 2025, absorbing former ALPHV and LockBit affiliates. Infrastructure went dark on April 1, 2025 in what is widely assessed as a DragonForce takeover — DragonForce subsequently claimed RansomHub had "joined the cartel," absorbing its affiliates and infrastructure. Widely believed to be a rebrand of the Knight ransomware operation.
expand profile
active since~February 2024 (infrastructure dark April 2025)
also known asCyclops (origin), Knight ransomware (confirmed rebrand per CISA)
primary motivationFinancial — RaaS / double extortion
mitre groupUnassigned
primary targets
Healthcare
Critical infrastructure
Government
Financial Services
Technology
Water utilities
typical methods
RaaS affiliate model with up to 90% affiliate revenue split — highest in the ecosystem; cross-platform Go-based encryptor supporting Windows, Linux, ESXi, FreeBSD, and embedded NAS platforms; Betruger custom multi-function backdoor for pre-encryption staging (credential theft, screenshot capture, keylogging, network scanning, exfiltration in one payload); exploitation of Fortinet, Citrix, and Apache vulnerabilities for initial access; recruited aggressively from former ALPHV/BlackCat and LockBit affiliates post-disruption; attacked Change Healthcare, UnitedHealth, and Planned Parenthood during peak activity; CISA/FBI joint advisory issued August 2024.
view full profile
RY
Rhysida
Russia / CIS (assessed) — RaaS operation
ransomware
active
Emerged in 2023 and built a reputation for hitting healthcare and government targets with outsized ransom demands. Hit the British Library (destroying a decade of digital infrastructure), Insomniac Games (leaking unreleased Marvel IP), and Maryland's Transit Administration in 2025. Assessed to share affiliates with Vice Society.
expand profile
active since~May 2023
also known asRhysida (no widely adopted cross-vendor alias); assessed Vice Society affiliate overlap
primary motivationFinancial — RaaS / double extortion
mitre groupUnassigned
primary targets
Healthcare
Government / Public sector
Education
Media / Entertainment
Defense contractors
typical methods
VPN credential compromise and phishing for initial access; PsExec and living-off-the-land binaries for lateral movement; PowerShell for reconnaissance and payload staging; ChaCha20 encryption scheme; self-deleting payloads to impede forensics; double extortion with a dark web auction model — stolen data listed for sale to the highest bidder rather than a fixed ransom demand; demands ranging from 30–90 Bitcoin per victim; CISA advisory released November 2023 noting overlap with Vice Society TTPs.
view full profile
MD
Medusa
Russia — RaaS operation
ransomware
active
A prolific RaaS operation with a notable healthcare focus, responsible for attacks on Comcast, Minneapolis Public Schools, and numerous hospital networks. Distinguished by its use of a Telegram bot for victim negotiations and a "Medusa Blog" leak site offering a pay-to-delay feature where victims can pay per day to extend their disclosure deadline.
expand profile
active since~2021 (Medusa locker); MedusaLocker distinct from Medusa ransomware group — group tracked here emerged ~2022–2023
also known asMedusa Ransomware Group (not to be confused with MedusaLocker malware family)
primary motivationFinancial — RaaS / triple extortion
mitre groupUnassigned
primary targets
Healthcare
Education
Technology / Media
Government
Manufacturing
typical methods
Initial access via phishing and exploitation of unpatched internet-facing services (RDP, VPN); abuse of legitimate remote management tools (AnyDesk, PDQ Deploy, Navicat); Mimikatz for credential harvesting; Cobalt Strike for C2; PowerShell and WMI for persistence; file encryption using AES-256; triple extortion model — ransom + public disclosure threat + direct victim-contact calls; Telegram bot channel for negotiation and payment; "Medusa Blog" dark web leak site with pay-to-delay timer; CISA advisory issued March 2025 warning of increased targeting of critical infrastructure.
view full profile
SP
SafePay
Unknown — centralized RaaS operation
ransomware
active
A fast-rising ransomware operation built on leaked LockBit 3.0 source code that manages all attack phases internally without a traditional affiliate model. Hit global IT distributor Ingram Micro in 2025 — causing an estimated $136 million in daily revenue losses and claiming 3.5 TB of stolen data — before surging 223% in victim volume in Q1 2025 alone.
expand profile
active since~2024
also known asSafePay (no widely adopted aliases as of 2026)
primary motivationFinancial — centralized double extortion
mitre groupUnassigned
primary targets
Manufacturing / Industrial
Healthcare
Construction
Transportation / Logistics
Technology / IT distribution
typical methods
Centralized operations — no affiliates; all intrusion, encryption, negotiation, and data leak stages managed by the core group directly; RDP and VPN exploitation using compromised credentials and weak passwords; Mimikatz for privilege escalation; custom LOLBin-heavy lateral movement scripts; LockBit 3.0-derived modular encryptor with flexible target configuration; aggressive double extortion with a dedicated data leak site; rapid pivot to high-value targets following initial access; Ingram Micro attack (2025) is the largest confirmed incident attributed to the group.
view full profile
PL
Play
Russia / Latin America — closed RaaS operation
ransomware
active
A consistently high-volume ransomware group notable for exploiting zero-day vulnerabilities and compromised valid credentials, with a strong focus on critical infrastructure. Attacked the City of Oakland, the City of Lowell (Massachusetts), and the Dallas County government. Play nearly doubled its victim count between Q1 and Q2 2025, with a sustained focus on government, healthcare, and manufacturing.
expand profile
active since~June 2022
also known asPlayCrypt, Balloonfly (Palo Alto Unit 42), FANCYCAT (potential affiliate overlap)
primary motivationFinancial — closed RaaS / double extortion
mitre groupG1040
primary targets
Government / Municipal
Manufacturing
Healthcare
Critical infrastructure
Media / Entertainment
Legal / Professional services
typical methods
Exploitation of zero-day and N-day vulnerabilities in edge appliances (FortiOS, Microsoft Exchange ProxyNotShell chain, Cisco); stolen VPN and RDP credentials for initial access; Cobalt Strike and SystemBC for post-exploitation; AdFind for Active Directory reconnaissance; GMER, IOBit, and PowerTool for disabling EDR; data exfiltration via WinRAR and WinSCP before encryption; unique single-extension (.play) file encryption; ransom notes contain only a single email address with no ransom amount disclosed — demands issued after contact; no public data leak site at launch but adopted one by mid-2023; CISA advisory issued December 2023.
view full profile
NS
NightSpire
Unknown (assessed non-Western) — closed group
ransomware
active
An emerging group that launched its leak site in March 2025 and claimed 200+ victims across 33+ countries by early 2026. Assessed as a rebrand of Rbfs ransomware based on shared operators, victim overlap, and infrastructure continuity. Primary initial access vector is CVE-2024-55591, a critical FortiOS authentication bypass. Notable for significant OPSEC failures including Gmail usage and exposed server headers.
expand profile
active sinceMarch 2025 (DLS launched); February 2025 (data-only operations)
also known asRbfs ransomware (assessed predecessor); operators: xdragon128, cuteliyuan
primary motivationFinancial — double extortion; ransom demands $150K–$2M
mitre groupUnassigned
primary targets
Manufacturing
Technology / IT Services
Healthcare
Financial Services
Construction
United States (primary)
typical methods
Exploits CVE-2024-55591 (FortiOS authentication bypass, CVSS 9.6) for initial access; LOLBin-heavy lateral movement via PowerShell, PsExec, WMI; Mimikatz credential dumping; Everything.exe for file enumeration; MEGACmd / WinSCP exfiltration to MEGA cloud storage; Go-based ransomware with hybrid AES/RSA encryption; .nspire file extension; does NOT delete VSS shadow copies; ransom demands $150K–$2M; countdown timers as short as 2 days; assessed Rbfs rebrand per IntelFusions, Halcyon.
view full profile
CC
APT1 / Comment Crew
China — PLA Unit 61398
nation-state
dormant
The single most documented cyber espionage unit in history. Operating out of a 12-story building in Shanghai's Pudong district, APT1 systematically compromised 141 organizations across 20 industries over at least seven years, stealing hundreds of terabytes of intellectual property. Mandiant's 2013 exposure report — linking the group to PLA Unit 61398 — remains the defining publication in the history of cyber threat intelligence.
expand profile
active since~2006 (dormant post-2014 indictments)
also known asComment Group, Comment Panda, Byzantine Candor, Shanghai Group, TG-8223, GIF89a, Brown Fox
primary motivationIntellectual property theft / economic espionage
mitre groupG0006
primary targets
Aerospace & Defense
Energy & Petrochemical
Telecommunications
Financial Services
Manufacturing
United States (primary)
typical methods
Spearphishing with malicious attachments; custom malware families (WEBC2, BISCUIT, SEASALT, MAPIGET — 40+ documented families); DNS-based C2 via Comment-field encoding (origin of "Comment Crew" alias); long-dwell persistence averaging months to years per victim; largest single-victim exfiltration documented at 6.5 TB in ten months; operated on a structured 9-to-5 schedule aligned with Shanghai business hours; five Unit 61398 officers indicted by US DOJ in May 2014 — the first criminal indictment of foreign military officials for economic cyber espionage.
view full profile
GP
APT3 / Gothic Panda
China — MSS / Boyusec contractor
nation-state
dormant
A Chinese MSS-linked espionage unit operating through the front company Boyusec, attributed by Recorded Future and confirmed by a 2017 DOJ indictment. Known for exploiting zero-days in Internet Explorer, Flash, and Office to compromise aerospace, defense, and telecom targets in the US and UK before pivoting to Hong Kong political entities ahead of the 2016 elections. One of the first APT groups publicly linked to China's civilian intelligence service rather than the PLA.
expand profile
active since~2010 (dormant post-2017 Boyusec indictment)
also known asBuckeye, Pirpi, UPS Team, TG-0110, Brocade Typhoon, BRONZE MAYFAIR, Red Sylvan, BORON
primary motivationEspionage / zero-day exploitation / IP theft
mitre groupG0022
primary targets
Aerospace & Defense
Telecommunications
Construction & Engineering
Transportation
Energy
Hong Kong political entities
typical methods
Spearphishing and watering-hole attacks delivering browser-based zero-day exploits (IE CVE-2014-1776, Flash CVE-2015-3113); custom malware suite including SHOTPUT (persistent backdoor), PIRPI (memory-based RAT), COOKIECUTTER, and PlugX; Operation Clandestine Fox and Operation Double Tap campaigns; credential theft via LSASS dumping; lateral movement using Windows administrative tools; pivot to Hong Kong pro-democracy targets circa 2015–2016; front company Boyusec identified by Intrusion Truth and Recorded Future; three Boyusec employees indicted by US DOJ in November 2017.
view full profile
NP
APT12 / Numbered Panda
China — PLA-linked
nation-state
active
A PLA-linked espionage group with a sustained focus on Taiwan, Japan, and media organizations that publish reporting unfavorable to PRC leadership. Best known for a 2012 breach of The New York Times — sustained for over four months — timed to a Pulitzer-winning investigation into Premier Wen Jiabao's family wealth. FireEye dubbed them "Darwin's Favourite APT Group" after observing the group retool their entire malware infrastructure twice in direct response to security vendor publications.
expand profile
active since~2009–2010 (ongoing)
also known asIXESHE, DynCalc, DNSCALC, Calc Team, BeeBus, BRONZE GLOBE, Hexagon Typhoon, Crimson Iron, TG-2754, Group 22
primary motivationEspionage — media, government, and defense targeting
mitre groupG0005
primary targets
Media / Journalism
Government (Taiwan, Japan)
Defense Industrial Base
Telecommunications
Electronics Manufacturing
High Technology
typical methods
Spearphishing with malicious Office and PDF documents exploiting CVE-2012-0158; decoy documents in Traditional Chinese targeting Taiwanese interests; screensaver (.scr) executables as delivery mechanism; dynamic DNS C2 port calculation (origin of "DynCalc" / "DNSCALC" aliases); malware arsenal includes IXESHE, RIPTIDE, HIGHTIDE, ETUMBOT, AUMLIB, IHEATE, RapidStealer, THREEBYTE, and WaterSpout; defining characteristic is rapid retooling — APT12 has twice rebuilt malware infrastructure within weeks of security vendor publications exposing their TTPs.
view full profile
DD
APT17 / Deputy Dog
China — MSS Jinan bureau
nation-state
active
A Chinese MSS unit operating out of Jinan, attributed by Intrusion Truth to MSS officer Guo Lin and a network of local contractor firms. Known for "hiding in plain sight" — embedding encoded C2 addresses inside legitimate Microsoft TechNet forum posts and profiles to evade detection. Confirmed active as recently as mid-2024, with targeted campaigns against Italian government and business entities using the 9002 RAT.
expand profile
active since~2010 (ongoing)
also known asDeputy Dog, BRONZE KEYSTONE, Axiom, Tailgator Team, Sneaky Panda, TG-8153, SIG22, TEMP.Avengers, Dogfish, ATK 2
primary motivationGovernment and defense industry espionage
mitre groupG0025
primary targets
US Government
Defense Industrial Base
Law Firms
Information Technology
Mining / Resource Extraction
NGOs
typical methods
Spearphishing delivering BLACKCOFFEE malware; C2 obfuscation via encoded payloads embedded in Microsoft TechNet forum threads and profile pages ("hiding in plain sight"); BLACKCOFFEE supports file/process operations, reverse shell, and extensible backdoor commands; 9002 RAT (also known as McRAT, Hydraq) used in 2024 Italian campaigns; attributed to Jinan MSS bureau by Intrusion Truth — identified operators include MSS officer Guo Lin, Wang Qingwei, and Zeng Xiaoyong (aka "envymask"), whose ZoxRPC/ZoxPNG code became a core component of the group's tooling.
view full profile
DP
APT18 / Dynamite Panda
China — PLA Navy-linked
nation-state
active
A PLA Navy-linked espionage group with a pronounced focus on healthcare, biotechnology, and defense. Responsible for the 2014 breach of Community Health Systems, in which SSNs and PII for 4.5 million patients were exfiltrated — believed to have exploited the OpenSSL Heartbleed vulnerability for initial access. Distinguished operationally by their speed: the group is known to weaponize newly released public exploits within days of disclosure, pivoting targets and retooling infrastructure faster than most state-sponsored actors.
expand profile
active since~2009 (ongoing)
also known asTG-0416, Wekby, Scandium, Satin Typhoon, TA-428, Threat Group-0416
primary motivationHealthcare and manufacturing espionage / IP theft
mitre groupG0026
primary targets
Healthcare / Biotechnology
Aerospace & Defense
Telecommunications
Manufacturing / High Technology
Human Rights Groups
Government
typical methods
Spearphishing delivering HTTPBrowser, Pisloader, Gh0st RAT, and PoisonIvy; rapid exploitation of newly public zero-days — notably the HackingTeam Flash zero-day (CVE-2015-5119) and OpenSSL Heartbleed (CVE-2014-0160); DNS-based C2 covert channels; Return-Oriented Programming (ROP) packing to evade endpoint detection; persistence via HKCU Run registry keys; lateral movement using at.exe scheduled tasks and credential reuse against RDP, VPN, and Citrix; PHI exfiltration including patient records, medical device data, and pharmaceutical IP; pivots sectors rapidly — shifted from technology and manufacturing into healthcare in 2012 and has sustained that focus.
view full profile
CS
APT19 / Codoso
China — contractor-linked (assessed MSS-adjacent)
nation-state
active
A Chinese espionage group assessed to operate through freelance contractors with state sponsorship, targeting legal, financial, and defense sectors with unusual precision. Notable for a 2015 watering hole attack via Forbes.com and a 2017 phishing campaign that specifically targeted seven law firms and investment companies — an unusually deliberate focus on entities handling M&A negotiations, IP filings, and sensitive government contracts. Some researchers assess APT19 and Deep Panda as the same operation; attribution remains debated.
expand profile
active since~2012 (ongoing)
also known asC0d0so0, Codoso Team, Sunshop Group, Deep Panda (possible overlap), Shell Crew, BRONZE FIRESTONE, Checkered Typhoon, KungFu Kittens, Black Vine
primary motivationLegal, defense, and financial sector espionage / IP theft
mitre groupG0073
primary targets
Legal Services / Law Firms
Defense & Aerospace
Finance & Investment
Energy / Pharmaceutical
Telecommunications
High Technology
typical methods
Spearphishing with macro-enabled Microsoft Office documents and custom RTF implants; watering hole attacks against high-value websites (Forbes.com, 2015); BEACON and Cobalt Strike payloads; PowerShell-based C2 over HTTP/HTTPS; backdoored software including serial number generators used as trojanized lures; strategic web compromise to deliver drive-by downloads; 2017 campaign specifically targeted seven law and investment firms, exploiting the privileged access attorneys hold to client M&A strategies, IP portfolios, and regulatory filings.
view full profile
A3
APT30
China — state-sponsored
nation-state
active
One of the longest-running documented espionage operations in history, active since at least 2005 with infrastructure dating to 2004. APT30 is singular in its focus: Southeast Asian political dynamics, ASEAN deliberations, disputed territorial claims, and journalists covering topics the CCP considers threats to its legitimacy. Operations spike around ASEAN summits. Uniquely developed air-gap crossing capabilities — malware designed to propagate via USB drives into networks with no internet connectivity — suggesting high-value targets inside physically isolated government systems.
expand profile
active since~2005 (infrastructure traced to 2004; ongoing)
also known asNo widely adopted alias — tracked primarily as APT30
primary motivationLong-term political espionage / Southeast Asia and India focus
mitre groupG0013
primary targets
ASEAN governments
India (defense, telecom)
Journalists / Media
Aerospace & Defense
Telecommunications
Vietnam, Thailand, Malaysia, South Korea
typical methods
Spearphishing with decoy documents themed around regional border disputes, ASEAN summits, and China-India relations; modular malware framework (BACKSPACE, NETEAGLE, LECNA, CREAM) with versioned development and structured C2 callback architecture; air-gap crossing via USB-propagating malware targeting physically isolated networks; C2 domains maintained for an average of five years — far longer than typical APT infrastructure; 'hide mode' commands enabling long-term stealthy persistence; journalists targeted specifically to anticipate unfavorable coverage and shape public messaging ahead of publication.
view full profile
OL
APT32 / OceanLotus
Vietnam — state-linked
nation-state
active
Vietnam's primary offensive cyber unit, conducting espionage across two distinct tracks simultaneously: corporate targets — multinationals entering Vietnam's manufacturing, hospitality, and consumer goods sectors — and domestic dissidents, pro-democracy bloggers, and human rights organizations. A 2024 Huntress investigation uncovered an intrusion against a Vietnamese human rights defender that had been running undetected for at least four years. In early 2025, the group escalated supply-chain tradecraft by distributing backdoored security tools via GitHub, targeting Chinese cybersecurity professionals.
expand profile
active since~2014 (ongoing; some sources place activity as early as 2012)
also known asSeaLotus, APT-C-00, Canvas Cyclone, BISMUTH, Cobalt Kitty
primary motivationRegional espionage / dissident surveillance / corporate IP theft
mitre groupG0050
primary targets
Vietnamese dissidents & NGOs
Foreign multinationals in Vietnam
ASEAN governments
Media / Journalists
Manufacturing & Hospitality
Security researchers (2025)
typical methods
Multilingual spearphishing with in-memory shellcode loaders; watering hole attacks against 100+ compromised websites — payloads delivered selectively only to profiled targets, not all visitors; fake news sites and Facebook pages distributing malware to Southeast Asian dissidents; custom Google apps harvesting Gmail credentials and contact lists; PowerShell obfuscation via Invoke-Obfuscation; event log clearing and forensic evidence destruction; Cobalt Strike beacons with HTTPS C2; supply-chain abuse via backdoored GitHub repositories (2025); signed legitimate DLLs (iisutil.dll) repurposed as persistence loaders; multi-year dwell times documented across multiple intrusions.
view full profile
MT
APT5 / Mulberry Typhoon
China — MSS-linked
nation-state
active
A large, multi-subgroup Chinese espionage actor with a singular obsession: telecommunications infrastructure and satellite communications. Mandiant assesses over half of APT5's confirmed victims operate in the telecom or technology sectors. The group has a documented pattern of exploiting zero-days in network edge devices — Pulse Secure VPN, Fortinet, and Citrix ADC — to achieve pre-authentication access, prompting a rare dedicated NSA threat-hunting advisory in December 2022 attributed specifically to this group.
expand profile
active since~2007 (ongoing)
also known asMANGANESE, BRONZE FLEETWOOD, Keyhole Panda, UNC2630, Poisoned Flight, TABCTENG, TEMP.Bottle
primary motivationTelecom and defense espionage / zero-day exploitation
mitre groupG1023
primary targets
Telecommunications
Satellite Communications
Aerospace & Defense
High-Tech Manufacturing
Military Technology (UAVs)
US, Europe, Southeast Asia
typical methods
Zero-day exploitation of network edge devices: Citrix ADC (CVE-2022-27518, CVSS 9.8) — NSA issued dedicated threat-hunting guidance; Pulse Secure VPN zero-day (2021) used to breach US Defense Industrial Base networks; Fortinet VPN exploitation; unauthorized modification of router OS images and embedded firmware; keyloggers targeting corporate executives; theft of satellite communications data, UAV specifications, and military procurement documents; ORB network infrastructure (SPACEHOP) used for reconnaissance scanning; custom Tricklancer malware; assessed to comprise multiple distinct subgroups with different TTPs and infrastructure.
view full profile
AP
Aquatic Panda
China — MSS-linked / i-Soon contractor
nation-state
active
A Chinese espionage actor operating under the Winnti Group umbrella and tied to i-Soon, the Chengdu-based MSS contractor exposed in a 2024 leak that revealed the scale of China's contractor-driven hacking apparatus. In March 2025, the FBI added named i-Soon employees to its Most Wanted list following DOJ indictments covering espionage campaigns from 2016 to 2023. ESET's Operation FishMedley investigation documented a 10-month 2022 campaign hitting seven organizations across Taiwan, Hungary, Turkey, Thailand, France, and the United States — governments, Catholic charities, NGOs, and think tanks.
expand profile
active since~2019–2020 (ongoing; retroactively linked to 2016 i-Soon campaigns)
also known asFishMonger, Earth Lusca, TAG-22, Red Dev 10, Bronze University, Charcoal Typhoon, RedHotel
primary motivationTelecom and government intelligence collection / global espionage
mitre groupG0143
primary targets
Government agencies
Telecommunications
NGOs / Think Tanks
Religious organizations
Latin America (2024 escalation)
Taiwan, Europe, US
typical methods
Watering hole attacks and exploitation of public-facing applications for initial access; modular ShadowPad implant (keylogging, screenshots, file exfiltration) decoded in memory only; additional tooling includes Spyder, SodaMaster, RPipeCommander, ScatterBee loader, SprySOCKS, FunnySwitch, BIOPASS RAT, and Cobalt Strike; DNS-based and encrypted C2 channels; 2022 Operation FishMedley targeted seven organizations across five countries over ten months; linked to i-Soon contractor whose 2024 document leak exposed internal operations — i-Soon's workforce has since shrunk significantly and the company faces ongoing legal action, though China's broader contractor ecosystem continues operating.
view full profile
AX
Axiom / Group 72
China — state-sponsored (Chinese Intelligence Apparatus)
nation-state
active
One of the most operationally disciplined Chinese APT groups on record. Novetta's Operation SMN coalition — involving Cisco, Symantec, FireEye, Microsoft, and others — removed over 43,000 installations of Axiom tooling from networks worldwide and assessed the group with moderate-to-high confidence as part of China's Intelligence Apparatus. Unlike APT1, whose operators were identifiable through poor OPSEC, no Axiom operator mistakes have ever been publicly documented. Targets span Fortune 500 companies, pro-democracy NGOs, environmental groups, journalists, and aerospace and defense contractors across North America, Europe, and East Asia.
expand profile
active since~2008 (ongoing)
also known asGroup 72, Hidden Lynx (some overlap assessed; treated as distinct by MITRE)
primary motivationAerospace and defense IP theft / broad-spectrum espionage
mitre groupG0001
primary targets
Aerospace & Defense
Manufacturing / Industrial
Government agencies
Pro-democracy NGOs
Media / Journalists
US, Japan, Taiwan, South Korea
typical methods
Watering hole attacks, spearphishing, and web-based initial access; ten-plus custom malware tools including Hikit (stealthy RAT with rootkit functionality), Fexel, Gresim, Derusbi, Naid, Moudoor, ZXShell, and Darkmoon; supply chain compromise — breached Bit9's trusted file-signing infrastructure in 2012 to sign malicious payloads with a legitimate certificate (VOHO campaign); C2 infrastructure compartmentalized per target cluster for operational separation; victim lifecycle measured in years; no publicly documented operator OPSEC failures — assesses as a subgroup of a larger, structured intelligence organization with professional development practices and defined software versioning methodology.
view full profile
BD
BackdoorDiplomacy
China — state-aligned
nation-state
active
Named for its singular focus: Ministries of Foreign Affairs. Active since at least 2017, this China-aligned group systematically targets diplomatic organizations across Africa, the Middle East, Europe, and Asia using a custom backdoor lineage (Quarian → Turian) that has been under continuous development for over a decade. Palo Alto Unit 42 tracks this actor as Playful Taurus and overlaps it with APT15 — one of China's longest-running espionage clusters. Iranian government networks were confirmed compromised in a 2022 campaign documented by Unit 42.
expand profile
active since~2017 (Turian lineage traced to Quarian activity from 2013; ongoing)
also known asPlayful Taurus (Unit 42), APT15 (assessed overlap), Vixen Panda, KeChang, NICKEL — ESET designation: BackdoorDiplomacy
primary motivationForeign ministry and telecom espionage / diplomatic intelligence collection
mitre groupG0135
primary targets
Ministries of Foreign Affairs
Embassies
Telecommunications (Africa)
Charities / NGOs (Middle East)
African nations (primary)
Iran, Europe, Asia
typical methods
Initial access via exploitation of internet-exposed devices: F5 BIG-IP (CVE-2020-5902), Microsoft Exchange (China Chopper webshell), and poorly configured file-upload interfaces on Plesk servers; Turian backdoor — evolved from Quarian, cross-platform (Windows and Linux), obfuscated with VMProtect, with randomized command IDs in recent variants; DLL sideloading via legitimate executables (McAfee, Microsoft Credential Backup Wizard); USB removable media collection and exfiltration; open-source tools for network scanning and lateral movement; TTY reverse shell capability on Linux targets; modifies tools per geographic region to hinder attribution tracking; Turian's network encryption shares characteristics with the Whitebird backdoor used by the Calypso group, suggesting possible shared development resources.
view full profile
AD
Aoqin Dragon
China — state-suspected (Chinese-speaking team)
nation-state
active
A quietly operating Chinese-speaking espionage group that ran undetected for nearly a decade before SentinelOne's 2022 disclosure. Active since at least 2013, Aoqin Dragon focuses on government, education, and telecom targets in Southeast Asia and Australia — nations of direct interest to Chinese foreign policy. The group has evolved its infection chain three times across its operational history, cycling from document exploits to fake antivirus droppers to fake removable device shortcuts, consistently finding new methods to evade detection and extend dwell time.
expand profile
active since~2013 (ongoing)
also known asUNC94 (partial overlap, Mandiant); possible tactical association with Naikon APT
primary motivationGovernment and telecom espionage / Southeast Asia and Australia focus
mitre groupG1007
primary targets
Government agencies
Telecommunications
Education
Cambodia, Vietnam, Singapore
Hong Kong
Australia
typical methods
Three distinct infection chain phases: (1) 2013–2015 — RTF document exploits (CVE-2012-0158, CVE-2010-3333) with APAC political and pornographic lure themes, including MH370-themed decoys; (2) ~2015–2018 — executable droppers masquerading as McAfee and Bkav antivirus software; (3) 2018–present — fake removable device .LNK shortcut files (RemovableDisc.exe) disguised with an Evernote icon, functioning as a two-stage loader that spreads to other USB drives and injects an encrypted backdoor into rundll32 memory; primary backdoors are Mongall (custom remote shell) and a modified Heyoka (DNS tunneling); DLL hijacking; Themida-packed payloads; persistence via EverNoteTrayService autostart; assessed as a small team, likely part of a broader Chinese intelligence tasking structure.
view full profile
TU
Turla / Snake
Russia — FSB Center 16
nation-state
active
Russia's premier long-term espionage unit, active since at least 1996 and attributed to FSB Center 16. Described by the US government as operating "the most sophisticated cyber-espionage tool in the FSB's arsenal" — the Snake implant, developed since 2003 and active for over 20 years. In May 2023, the FBI's Operation MEDUSA remotely neutralized Snake's peer-to-peer network across 50+ countries using a custom tool named PERSEUS. Turla then adapted, hijacking other nation-state actors' infrastructure — including a Pakistani APT's C2 servers — to conduct espionage without direct exposure. In 2025, confirmed conducting adversary-in-the-middle attacks at ISP level against foreign embassies in Moscow.
expand profile
active since~1996 (Moonlight Maze lineage); Snake implant since 2003; ongoing
also known asSnake, Uroburos, Waterbug, Venomous Bear, WhiteBear, IRON HUNTER, Secret Blizzard, Pensive Ursa, KRYPTON, SUMMIT, Blue Python, BELUGASTURGEON, Group 88
primary motivationLong-term strategic espionage / government and NATO targeting
mitre groupG0010
primary targets
NATO governments
Ministries of Foreign Affairs
Embassies
Defense / Military
Journalists
50+ countries confirmed
typical methods
Spearphishing and watering hole attacks for initial access; Snake/Uroburos rootkit — cross-platform (Windows, macOS, Linux), modular, routed stolen data through a covert peer-to-peer botnet of infected machines to evade SIGINT detection; satellite-based C2 (early operations); ComRAT, Carbon, Kazuar, HyperStack, TinyTurla, TwoDash, LunarWeb, LunarMail, and ApolloShadow across different campaign phases; hallmark tactic of hijacking other nation-states' infrastructure — documented cases include Iranian APT backdoors (2019), Pakistani Storm-0156 C2 servers and CrimsonRAT installations (2022–2024), and Storm-1837 (2024); AiTM attacks at ISP level against foreign embassies in Moscow (2025); FBI operators noted Turla works regular business hours from FSB facilities in Moscow and Ryazan.
view full profile
EB
Dragonfly / Energetic Bear
Russia — FSB Center 16
nation-state
active
Russia's dedicated critical infrastructure access unit, operating since at least 2010 with a singular focus: gaining and maintaining persistent access to energy grids, utilities, and industrial control systems — not to destroy them, but to understand how they work and be positioned to act. The DOJ indicted four FSB officers in 2022 for targeting US energy, nuclear, and water systems. In 2025, linked to the Static Tundra campaign exploiting aged Cisco router vulnerabilities across telecom and infrastructure networks, and to a major attack on Poland's energy sector.
expand profile
active since~2010 (TeamSpy origins); ongoing — Static Tundra campaign active 2025
also known asEnergetic Bear, Berserk Bear, IRON LIBERTY, Crouching Yeti, Ghost Blizzard, DYMALLOY, BROMINE, Havex, Koala, TeamSpy, TG-4192, ALLANITE
primary motivationCritical infrastructure access / energy sector pre-positioning
mitre groupG0035
primary targets
Energy / Utilities / ICS
Nuclear facilities
Aviation networks
SLTT government (US)
Telecommunications
US, Europe, Turkey
typical methods
Spearphishing, watering hole attacks, and supply chain compromise via trojanized vendor ICS software (Havex/Backdoor.Oldrea — Dragonfly campaign); TeamViewer abuse for remote surveillance (TeamSpy); LightsOut exploit kit for credential and configuration harvesting; focus on ICS/SCADA network mapping, operational documentation, and credential exfiltration rather than immediate disruption; 2020 campaign compromised dozens of US SLTT and aviation networks, exfiltrating sensitive network configs and passwords; 2022 DOJ indictment of three FSB officers and one civilian contractor; 2025 Static Tundra campaign exploiting CVE-2018-0171 (Cisco IOS Smart Install) for long-term router access across telecom and infrastructure networks; attributed to December 2025 attack on Polish energy sector infrastructure.
view full profile
AL
ALLANITE
Russia — suspected FSB-linked
nation-state
active
A narrowly focused ICS reconnaissance group targeting electric utilities in the US and UK, first documented by Dragos in 2018 and linked to the DHS's Palmetto Fusion campaign designation. What distinguishes ALLANITE from Dragonfly and similar actors is its operational discipline: the group deploys no custom malware, relying entirely on native Windows tools. Its confirmed activity — collecting and distributing screenshots of ICS human-machine interfaces — signals pre-positioning rather than an immediate intent to cause disruption, though Dragos assesses the group maintains access for exactly that purpose if needed.
expand profile
active since~2015 (documented operations from at least May 2017; ongoing)
also known asPalmetto Fusion (DHS designation)
primary motivationICS reconnaissance / electric utility sector access and pre-positioning
mitre groupG1000
primary targets
Electric utilities (US)
Electric utilities (UK)
ICS / SCADA environments
Business and OT networks
typical methods
Spearphishing and watering hole attacks targeting energy sector personnel for credential harvesting; entirely malware-free post-compromise operations — relies exclusively on legitimate Windows tools for lateral movement and reconnaissance; confirmed collection and distribution of screenshots of ICS human-machine interfaces (HMIs); credential reuse to pivot from business networks into ICS environments; Dragos assesses with moderate confidence the group maintains persistent ICS access to (1) develop a detailed understanding of operational processes, and (2) retain ready access for potential future disruptive use. Targeting and TTPs closely overlap with Dragonfly/DYMALLOY but technical capabilities are assessed as distinct and less advanced.
view full profile
EM
Ember Bear / UAC-0056
Russia — GRU Unit 29155
nation-state
active
A GRU cyber unit formally linked — in a September 2024 DOJ indictment — to Unit 29155, the same special operations unit responsible for the 2018 Salisbury nerve agent poisoning of Sergei Skripal. In January 2022, days before Russia's full-scale invasion of Ukraine, Ember Bear deployed WhisperGate: wiper malware disguised as ransomware that destroyed government computer systems and defaced websites. The operation hit at least 26 NATO countries beyond Ukraine and marked one of the first GRU cyber attributions to a unit previously known only for physical assassination and sabotage.
expand profile
active since~2020 (Ukraine/Georgia operations from early 2021; ongoing)
also known asCadet Blizzard, Saint Bear, UNC2589, TA471, Lorec53, Bleeding Bear, DEV-0586, Frozenvista, Nodaria, Nascent Ursa
primary motivationDestructive attacks against Ukraine / wiper operations / espionage and sabotage
mitre groupG1003
primary targets
Ukrainian government / telecom
NATO member states (26+)
Georgia (government / military)
Critical infrastructure
Defense sector
typical methods
Spearphishing with malicious documents delivering OutSteel document stealer and SaintBot downloader; GraphSteel and GrimPlant backdoors for persistent access; WhisperGate wiper (January 2022) — two-stage malware that overwrites the MBR with a fake ransom note (stage 1) then corrupts files with random four-byte extensions (stage 2), designed to destroy data while simulating ransomware; website defacement with threatening multilingual messages timed to coincide with kinetic military operations; CredPump and HoaxPen backdoors; web shell persistence; operations designed to create public mistrust in Ukrainian institutions and degrade government crisis response. September 2024 DOJ indictment named five Unit 29155 GRU officers and one civilian co-conspirator.
view full profile
XT
XENOTIME / Triton Group
Russia — CNIIHM-linked
nation-state
active
Described by Dragos as "easily the most dangerous threat activity publicly known." XENOTIME is the only threat actor ever confirmed to have intentionally targeted Safety Instrumented Systems — the last line of automated defense in industrial facilities designed to prevent explosions, fires, and chemical releases. The 2017 TRISIS attack on a Saudi Arabian petrochemical plant disabled safety controllers and was discovered only because an apparent misconfiguration accidentally triggered a safety shutdown before the intended destructive payload could execute. FireEye attributed the tooling with high confidence to CNIIHM, a Russian government research institute in Moscow.
expand profile
active since~2014 (ongoing; Dragos confirms continued activity)
also known asTEMP.Veles (FireEye), Triton / TRISIS / HatMan operators
primary motivationICS sabotage / safety system targeting / potential loss-of-life operations
mitre groupG0088
primary targets
Safety Instrumented Systems (SIS)
Oil & Gas (Middle East, global)
Electric utilities (US, APAC)
ICS vendors / manufacturers
Petrochemical / Chemical
typical methods
Long-duration ICS kill-chain intrusion: initial IT network compromise → lateral movement to OT via RDP jump boxes → credential capture and replay for ICS network access; TRISIS/TRITON malware framework — custom-built to interact directly with Schneider Electric Triconex SIS controllers via the TriStation protocol, reprogramming safety logic to fail-open during a hazardous event; zero-day exploitation against SIS firmware; watering hole attacks targeting industrial employees; supply chain compromise of ICS vendors for downstream access; PSExec and standard Windows tools post-compromise; attribution to CNIIHM supported by Moscow timezone behavior patterns, Cyrillic file artifacts, and an IP address registered to the institute linked to targeting reconnaissance; after 2017, expanded reconnaissance against US and APAC electric utilities, suggesting safety system attack blueprint is being adapted beyond oil and gas.
view full profile
SC
APT37 / ScarCruft
North Korea — RGB
nation-state
active
North Korea's primary espionage unit focused on South Korean domestic targets — government, academia, think tanks, North Korea-focused journalists, and defectors. ScarCruft's intelligence collection feeds directly into Pyongyang's decision-making on South Korean politics, defector networks, and international perceptions of the regime. Highly active through 2025, with campaigns targeting national intelligence researchers, South Korean cybersecurity professionals, and national security organizations, alongside Android spyware (KoSpy) distributed via Google Play Store.
expand profile
active since~2012 (ongoing — multiple confirmed campaigns through 2025)
also known asInkySquid, Reaper, Group123, TEMP.Reaper, Ricochet Chollima, RedEyes, Thallium (partial overlap)
primary motivationSouth Korea espionage / dissident surveillance / regime security intelligence
mitre groupG0067
primary targets
South Korean government / defense
North Korea-focused researchers
Defectors / human rights NGOs
Cybersecurity professionals
Japan, Vietnam, Russia, Middle East
typical methods
Spearphishing with geopolitically-themed lures — decoy documents impersonate conference invitations, intelligence research newsletters, North Korean troop deployment briefings, and Kim Yo Jong statements; RokRAT backdoor — cloud-hosted C2 via Dropbox, Google Cloud, pCloud, and Yandex Cloud for screenshot capture, file exfiltration, and system info collection; malicious LNK files with fileless PowerShell execution; CVE-2024-38178 (IE scripting engine) exploited in 2024 to deploy RokRAT; Dolphin backdoor for deep surveillance including drive monitoring, browser credential theft, and keylogging; KoSpy Android spyware distributed via Google Play Store posing as utility apps; PubNub real-time API abused for per-victim C2 channels (2025 VCD Ransomware campaign); NubSpy AutoIt-based loader; notable for targeting cybersecurity researchers using North Korea threat reports as lures to gain insight into non-public intelligence on their own operations.
view full profile
BB
APT38 / BeagleBoyz
North Korea — RGB Unit 180
nation-state
active
North Korea's primary financial cyber unit, responsible for generating hard currency at scale to fund the regime's nuclear and missile programs under international sanctions. Responsible for at least $81 million stolen from Bangladesh Bank in 2016 — stopped only because the Federal Reserve Bank of New York detected anomalies in the transfer instructions before a $1 billion theft could complete. By 2024–2025, the group had pivoted heavily toward cryptocurrency, stealing approximately $1.34 billion across 47 incidents in 2024 alone. The February 2025 Bybit heist — assessed at $1.5 billion — is believed to be the largest recorded crypto theft in history.
expand profile
active since~2014 (ongoing — Bybit heist February 2025)
also known asBluenoroff, NICKEL GLADSTONE, Stardust Chollima, Sapphire Sleet, COPERNICIUM, TraderTraitor (crypto sub-cluster)
primary motivationFinancial theft / SWIFT system attacks / cryptocurrency heists / sanctions evasion
mitre groupG0082
primary targets
Cryptocurrency exchanges
SWIFT system endpoints
Banks / Financial institutions (38+ countries)
ATM networks (FASTCash)
Blockchain developers
DeFi protocols
typical methods
Spearphishing and fake job offer lures targeting developers and finance staff; FASTCash ATM cash-out scheme — ISO 8583 message injection to authorize fraudulent withdrawals simultaneously across dozens of countries; SWIFT fraud via fraudulent transfer instructions from compromised bank terminals; wiper malware deployed post-theft to destroy forensic evidence (Chile bank 2018); CROWDEDFLOUNDER, HOPLIGHT, COPPERHEDGE RATs; ELECTRICFISH / VIVACIOUSGIFT tunneling tools; cryptocurrency phase: TraderTraitor campaigns deploying trojanized DeFi applications; social engineering via fake recruiters and deepfake AI Zoom meetings (2025); cross-chain bridge exploitation; laundering via mixers, OTC brokers, and privacy protocols; Chrome zero-day (CVE-2024-4947) exploited for RCE in DeTankZone campaign.
view full profile
AN
Andariel
North Korea — RGB 3rd Bureau
nation-state
active
One of North Korea's longest-running cyber units, operating since at least 2009 and elevated to formal APT status (APT45) by Mandiant in 2024. Andariel pursues two missions simultaneously: stealing classified military and nuclear technology from defense, aerospace, and engineering targets across the US, South Korea, Japan, and India — and funding those operations by running ransomware attacks against US healthcare entities. A July 2024 DOJ indictment named Rim Jong Hyok and offered a $10 million reward; charges included attacks on NASA and two US Air Force bases.
expand profile
active since~2009 (ongoing — indictment issued July 2024)
also known asSilent Chollima, PLUTONIUM, Onyx Sleet, APT45, Stonefly, Clasiopa, DarkSeoul, Wassonite
primary motivationMilitary / nuclear IP theft and ransomware-funded espionage
mitre groupG0138
primary targets
Defense / Aerospace (US, Japan, South Korea)
Nuclear sector
Engineering / Shipbuilding / Robotics
Healthcare (ransomware funding)
South Korean government / military
typical methods
Initial access via exploitation of known vulnerabilities — 41 CVEs documented in 2024 joint advisory including Log4Shell (CVE-2021-44228), Apache ActiveMQ (CVE-2023-46604), MOVEit (CVE-2023-34362), and GoAnywhere (CVE-2023-0669); spearphishing; watering hole and supply chain attacks; custom malware including Dtrack/Preft, TigerRAT, SmallTiger, LightHand, Dora RAT; open-source tools including Sliver, RMM tools, and Ngrok; ransomware (Maui) deployed against US healthcare entities to generate operational funding — documented cases of espionage and ransomware attacks launched against the same entity on the same day; targets classified information on tanks, howitzers, autonomous underwater vehicles, fighter aircraft, missile defense systems, uranium enrichment, and nano-satellite technology.
view full profile
AJ
AppleJeus / Gleaming Pisces
North Korea — RGB Bureau 121
nation-state
active
North Korea's dedicated cryptocurrency theft and software supply chain unit, operating under the Lazarus Group umbrella. Named for its signature tactic: distributing trojanized cryptocurrency trading apps, wallets, and DeFi platforms that silently steal private keys and credentials. Responsible for the 2023 3CX supply chain attack — itself a downstream consequence of an earlier supply chain compromise — marking one of the first confirmed supply-chain-within-a-supply-chain attacks. In August 2024, exploited a Chromium V8 zero-day (CVE-2024-7971) chained with a Windows kernel zero-day, deploying the FudModule rootkit against cryptocurrency sector targets.
expand profile
active since~2018 (ongoing — Chromium zero-day exploitation August 2024)
also known asGleaming Pisces, Citrine Sleet, Labyrinth Chollima, UNC4736, UNC1720, Hidden Cobra (partial)
primary motivationCryptocurrency theft / supply chain compromise / regime revenue generation
mitre groupG1049
primary targets
Cryptocurrency exchanges / wallets
DeFi protocols
Blockchain developers
Software supply chains
Gaming / gambling platforms
typical methods
Fake cryptocurrency trading platforms and wallet apps distributing AppleJeus Trojan — harvests wallet.dat files, private keys, and credentials via keylogging and clipboard hijacking; fake job offer lures targeting crypto professionals; 3CX supply chain attack (2023) — backdoored legitimate desktop communications software used by thousands of enterprises, itself traced to a prior compromise of a trading software firm; PyPI poisoned Python packages (2024) delivering PondRAT and PoolRAT backdoors for Linux and macOS targeting developers; Chromium zero-day CVE-2024-7971 (V8 type confusion) chained with Windows kernel CVE-2024-38106 to deploy FudModule rootkit in August 2024; FudModule achieves admin-to-kernel access via Direct Kernel Object Manipulation (DKOM); shared tooling and infrastructure with Diamond Sleet observed across campaigns.
view full profile
EL
APT33 / Elfin
Iran — IRGC-linked (Nasr Institute)
nation-state
active
Iran's most persistent aerospace and energy espionage unit, targeting the sectors that hold technology and IP Iran cannot acquire through legitimate channels due to international sanctions. Active since at least 2013 with a consistent focus on US, Saudi Arabian, and South Korean aviation, defense, and petrochemical organizations. By 2023–2025, the group executed a strategic shift from spearphishing to large-scale cloud-based password spraying against Microsoft 365 and Azure AD environments — moving from network perimeter attacks to identity-layer infiltration. Carries latent destructive capability via the SHAPESHIFT wiper, assessed as staged for use under geopolitical triggers.
expand profile
active since~2013 (ongoing — confirmed active 2025)
also known asHOLMIUM, Refined Kitten, Peach Sandstorm, Magnallium, COBALT TRINITY, Elfin Team
primary motivationAviation and energy sector espionage / aerospace IP theft
mitre groupG0064
primary targets
Aerospace / Aviation
Energy / Petrochemical
Defense contractors
Satellite / Space
US, Saudi Arabia, South Korea, UAE
typical methods
Large-scale password spraying against Microsoft 365 and Azure AD using 'go-http-client' user agent (2023–2025 signature); compromised education sector Azure accounts used to provision attacker-controlled Azure infrastructure for C2 — traffic blends with legitimate cloud usage; Tickler backdoor (2024) — delivered in ZIP archives as .pdf.exe files, uses DLL sideloading via signed Windows executables, persists via Registry Run key; TURNEDUP and POWERTON implants; Outlook Home Page abuse (CVE-2017-11774); Golden SAML attacks against federated identity environments; spearphishing with WinRAR ACE path traversal (CVE-2018-20250); custom developer handle "xman_1365_x" in TURNEDUP PDB path linked to IRGC's Nasr Institute; SHAPESHIFT wiper capability assessed as staged for potential future destructive use; confirmed one of the two most active Iran-linked APTs in H2 2025.
view full profile
RK
APT39 / Remix Kitten
Iran — MOIS / Rana Intelligence Computing
nation-state
active
The Iranian Ministry of Intelligence and Security's primary people-tracking unit, operating through the front company Rana Intelligence Computing. Unlike other Iranian APTs focused on IP theft or destructive operations, APT39's mission is human surveillance: acquiring the travel itineraries, call records, and personal data needed to monitor dissidents, journalists, opposition figures, and foreign officials inside and outside Iran. In September 2020, the US Treasury and FBI sanctioned Rana and 45 named individuals — making this one of the few cases where an APT's front company and specific employees have been formally designated.
expand profile
active since~2014 (ongoing)
also known asChafer, ITG07, COBALT HICKMAN, Burgundy Sandstorm, Radio Serpens, TA454, Cadelspy, Remexi
primary motivationDissident surveillance / travel and telecom sector data collection
mitre groupG0087
primary targets
Telecommunications providers
Airlines / travel booking systems
Iranian dissidents / journalists
Human rights organizations
Government / immigration databases
Middle East, Europe, North America
typical methods
Spearphishing with malicious Office documents delivering SEAWEED, CACHEMONEY, and POWBAT backdoors; spoofed airline, telecom, and travel provider domains to lure targets; VBS malware in Office documents; malicious AutoIt scripts; BITS malware (v1 and v2) for data aggregation and exfiltration; screenshot and keylogger utility masquerading as Firefox; Python-based downloader; Android implant (optimizer.apk) with info-stealing and remote access capabilities; Mimikatz and PsExec for lateral movement; data compression before exfiltration; primary intelligence collection objective is personal data — travel records, call logs, contact lists — for physical tracking and counterintelligence use by MOIS; Rana front company sanctioned by OFAC September 2020 with 45 named employees charged.
view full profile
AG
Agrius
Iran — MOIS-linked
nation-state
active
An Iran-aligned destructive unit that pioneered the "wiper-as-ransomware" playbook — deploying malware that destroys data while demanding payment, providing cover for state-directed sabotage as cybercrime. Active since 2020 with a primary focus on Israeli targets, Agrius has operated under multiple personas and progressively escalated its methods: from fake ransomware to a full supply chain attack in 2022, compromising an Israeli software developer to deploy the Fantasy wiper against the diamond industry. During the June 2025 Iran–Israel military conflict, infrastructure linked to Agrius was observed scanning Israeli cameras across the country, assessed as bomb damage assessment support.
expand profile
active since~2020 (ongoing — active June 2025 conflict)
also known asPink Sandstorm, AMERICIUM, Agonizing Serpens, BlackShadow, Marshtreader
primary motivationDestructive sabotage / Israeli targeting / information operations via hack-and-leak
mitre groupG1030
primary targets
Israel (primary)
UAE
HR / IT firms
Diamond / luxury sectors
Software supply chains
typical methods
Exploitation of known vulnerabilities in internet-facing web applications for initial access; ASPXSpy web shell deployment; IPsec Helper custom .NET backdoor for persistence and payload delivery; DEADWOOD wiper (early campaigns); Apostle — evolved from pure wiper to functional ransomware across versions; Fantasy wiper (2022) — supply chain attack via compromised Israeli software update mechanism, directly built on Apostle codebase; living-off-the-land techniques and publicly available offensive tools for lateral movement; operations commonly laundered through hacktivist personas (BlackShadow) to obfuscate state direction; CVE-2023-6895 and CVE-2017-7921 exploited June 2025 to scan Israeli internet-connected cameras during active military conflict; Israeli commercial VPN infrastructure used to blend C2 traffic.
view full profile
AS
Ajax Security Team
Iran — state-aligned
nation-state
dormant
A textbook example of Iranian hacktivist-to-APT pipeline: Ajax Security Team began as a publicly active defacement crew before being recruited into targeted espionage around 2014. Operating as Rocket Kitten, the group conducted campaigns against US defense contractors, Israeli institutions, Iranian dissidents, and users of anti-censorship tools — eventually accumulating a phishing infrastructure containing over 1,800 individual targets. Check Point's 2015 investigation gained root access to the group's own backend after the operators failed to secure it, exposing internal tools and operator identities — a rare window into an APT's operational infrastructure through their own OPSEC failures.
expand profile
active since~2010 (dormant — last confirmed active reporting ~2019–2020)
also known asRocket Kitten, Flying Kitten, AjaxTM, Operation Woolen-Goldfish, Operation Saffron Rose
primary motivationDefense industrial base espionage / anti-censorship tool targeting / dissident surveillance
mitre groupG0130
primary targets
US defense contractors
Israeli institutions / scientists
Iranian dissidents / activists
Anti-censorship tool users
Saudi government / royals
NATO / European defense
typical methods
Spearphishing with malicious Office documents delivering GHOLE malware (a customized CORE IMPACT penetration testing tool); Operation Woolen-Goldfish (2015): OneDrive-hosted executables with PowerPoint icons dropping CWoolger keylogger; personalized phishing pages generated by a custom tool ("Oyun") per individual target — nearly 26% credential submission rate observed; Telegram account compromise via SMS verification hijacking (15 million Iranian user IDs harvested in 2016); OPSEC failures exposed operator identities and internal tools — main developer identified as "Wool3n.H4T"; individual operators each tasked with hundreds of specific phishing targets organized by campaign; assessed as locally-recruited hacktivist talent absorbed into Iranian intelligence tasking structure.
view full profile
CK
CopyKittens
Iran — state-linked
nation-state
active
An Iran-linked espionage group profiled jointly by ClearSky and Trend Micro, notable for succeeding despite relatively unsophisticated tradecraft. Active since at least 2013, CopyKittens targeted government organizations, academic institutions, defense companies, and NGOs across Israel, Saudi Arabia, Turkey, Jordan, the US, and Germany. Operation Wilted Tulip documented the group's use of a particularly effective social engineering technique: gaining access to one email account in an organization, then waiting for natural conversation threads to develop before slipping a malicious link into an existing reply chain — a trusted-context attack that bypasses conventional suspicion.
expand profile
active since~2013 (ongoing)
also known asCopyKittens (ClearSky / Trend Micro designation) — Operation Wilted Tulip
primary motivationGovernment and academic espionage / broad strategic data collection
mitre groupG0052
primary targets
Government organizations
Academic institutions
Defense / IT firms
NGOs / news outlets
Israel, Saudi Arabia, Turkey, Jordan, US, Germany
UN employees
typical methods
Spearphishing with malicious email attachments; watering hole attacks via JavaScript injections into strategically selected sites including the Jerusalem Post and IDF Disabled Veterans Organization; weaponized Office documents; web server exploitation via vulnerability scanning and SQLi tools (Havij, sqlmap, Acunetix); fake social media profiles for social engineering; trusted-context reply-chain attack — compromises one account in a target organization, monitors for natural email conversations, then injects a malicious link into an existing thread to exploit established trust; DNS-based data exfiltration and C2; mix of off-the-shelf and custom malware tools; supply chain compromise via weaker organizations in a target's network to pivot toward higher-value targets; domains impersonating Microsoft, Google, Amazon, Facebook, and Oracle used for malware delivery and C2.
view full profile
AV
APT-C-23 / Arid Viper
Gaza — Hamas-linked (assessed)
nation-state
active
The primary cyber espionage arm assessed to operate on behalf of Hamas, targeting Israeli military and government personnel alongside Palestinian political opponents. Runs two concurrent surveillance tracks: external operations against Israeli targets — including IDF soldiers stationed near Gaza — and internal operations monitoring Fatah, Palestinian civil society, and diaspora journalists. Operation Bearded Barbie (2022) documented operators spending months building convincing fake Facebook personas, posting in Hebrew and engaging with Israeli communities, before delivering spyware to senior defense, law enforcement, and emergency services personnel.
expand profile
active since~2014 (some sources place activity from 2012; ongoing)
also known asMantis, Desert Falcon, Two-tailed Scorpion, TAG-63, Bearded Barbie, Gaza Cyber Gang, MoleRATs (partial overlap)
primary motivationIsraeli military targeting / Palestinian political surveillance / mobile spyware deployment
mitre groupG1028
primary targets
IDF soldiers / Israeli military
Israeli defense / law enforcement
Palestinian political rivals (Fatah)
Journalists / NGO workers (Gaza/WB)
Government / telecom (Middle East)
typical methods
Long-duration catfishing via fake Facebook personas — posts in target language, engages organically over months before delivering spyware; trojanized Android apps distributed via Google Play and third-party stores (Desert Scorpion, AridSpy, GnatSpy, VolatileVenom); cross-platform spyware arsenal covering Windows, Android, and iOS developed in Delphi, Go, Python, and C++; custom backdoors Barb(ie) Downloader and BarbWire (2022); spearphishing with politically themed lures including Gaza conflict and assassination-of-Soleimani decoys; watering hole attacks; PyMICROPSIA and Arid Gopher backdoors; Rust-based Rusty Viper backdoor (2023); Israeli military noted in 2019 and 2021 conducted airstrikes against Gaza facilities housing Hamas cyber operations.
view full profile
NK
Naikon
China — PLA Unit 78020
nation-state
active
One of the first PLA units to have a specific officer publicly identified and named by researchers. ThreatConnect and Defense Group Inc.'s 2015 Project CameraShy report traced Naikon's C2 infrastructure to PLA officer Ge Xing in Kunming — using social media cross-referencing, pattern-of-life analysis, and Chinese-language research across eight overlapping data points. Based in Yunnan province, PLA Unit 78020's mandate is signals intelligence and cyber espionage against South China Sea claimant nations, targeting the military, diplomatic, and economic sectors of Cambodia, Indonesia, Laos, Malaysia, Myanmar, Nepal, the Philippines, Singapore, Thailand, and Vietnam, as well as ASEAN and the UN Development Programme.
expand profile
active since~2010 (ongoing — Bitdefender documented campaign through March 2021; continued activity assessed)
also known asOverride Panda, Lotus Panda — no widely adopted single alias
primary motivationSoutheast Asia government espionage / South China Sea intelligence collection
mitre groupG0019
primary targets
Southeast Asian governments (10 nations)
Military / diplomatic / economic entities
ASEAN secretariat
UN Development Programme
South China Sea claimants
typical methods
Spearphishing with malicious Office document attachments exploiting CVE-2012-0158; global midpoint proxy infrastructure to obfuscate C2 attribution; Aria-body RAT (2020) for initial compromise; RainyDay backdoor for lateral movement, reconnaissance, password dumping, and reverse proxy; Nebulae backdoor for persistence and file operations; Sbiedll.dll exfiltration tool uploading collected files to Dropbox; geographic operator attribution achieved through C2 domain analysis — operator Ge Xing identified via social media handle "GreenSky27" embedded in malware infrastructure; notably observed in first documented APT-vs-APT engagement — the Hellsing group successfully counterattacked Naikon after being targeted by it.
view full profile
PW
Patchwork / Dropping Elephant
India — state-linked (assessed)
nation-state
active
India's primary assessed offensive cyber unit, named "Patchwork" by researchers for its habit of copy-pasting code from online forums — a development style that leaves distinctive fingerprints. Focused on espionage against Pakistan and China, the group targets military and defense R&D networks, Chinese diplomatic entities, and Pakistani government and security organizations. Highly active through 2025, with confirmed campaigns hitting Pakistan's defense sector, Turkish precision-guided missile manufacturers, and Bhutanese government entities — all geopolitically timed to India-Pakistan and India-China tensions.
expand profile
active since~2015 (some sources assess activity from 2009; ongoing — campaigns confirmed November 2025)
also known asDropping Elephant, Chinastrats, Quilted Tiger, Zinc Emerson, APT-C-09, Monsoon, Maha Grass, Orange Athos
primary motivationPakistan and China espionage / South Asia military and diplomatic intelligence
mitre groupG0040
primary targets
Pakistan defense / military R&D
Chinese government / diplomatic entities
Bhutan, Bangladesh, Sri Lanka
Turkish defense industry (2025)
Think tanks / NGOs (US, EU)
typical methods
Spearphishing with geopolitically-themed lures tailored to target sector; BADNEWS RAT and VajraSpy Android RAT (distributed via Google Play romance scam apps targeting Pakistan); Python-based backdoor delivered via MSBuild.exe LOLBIN abuse (2025 Pakistan defense campaign); BurteRatel C4 red-team framework (2024 Bhutan campaign); StreamSpy trojan using WebSocket C2 (late 2025); LNK file five-stage execution chain with VLC Media Player DLL sideloading (July 2025 Turkey campaign); watering hole attacks against sites frequented by Chinese diplomatic and defense targets; Brute Ratel C4 deployment; geofenced payloads targeting specific national IP ranges; code copy-paste development fingerprint enables attribution across campaigns despite tooling variation.
view full profile
SW
SideWinder
India — state-linked (assessed)
nation-state
active
One of the most prolific assessed Indian APT groups, active since 2012 and running multiple confirmed campaigns through late 2025. Historically focused on Pakistan, Sri Lanka, Nepal, and China, SideWinder has steadily expanded its geographic reach — adding maritime facilities in the Indian Ocean and Mediterranean, Middle East and African strategic infrastructure, and now Thailand and Indonesia. A four-wave spearphishing campaign against South Asian diplomats ran from March through September 2025, deploying the StealerBot post-exploitation toolkit first documented by Kaspersky in October 2024.
expand profile
active since~2012 (ongoing — confirmed active late 2025)
also known asT-APT-04, Rattlesnake, RAZOR TIGER, APT-C-17, Baby Elephant, Hardcore Nationalist, Leafperforator, RagaSerpent
primary motivationSouth and Southeast Asia government espionage / Pakistan and China targeting
mitre groupG0121
primary targets
Pakistan / Sri Lanka / Nepal / China
Maritime facilities (Indian Ocean, Mediterranean)
South Asian diplomatic corps
Military / government entities
Middle East and Africa (expanding)
Thailand, Indonesia (2025–2026)
typical methods
Spearphishing with highly customized lures per target — port authority documents (Port of Alexandria), Sri Lanka Customs tariff guides, military championship invitations, Central Bank monetary policy papers; server-side polymorphism: C2 serves different payloads based on victim IP and User-Agent — legitimate targets get next stage, others get 404 or decoy RTF; DLL sideloading via legitimate executables; CVE-2017-11882 (Office Equation Editor) and CVE-2017-0199 remain primary document exploit vectors, still effective against underpatched government environments; StealerBot post-exploitation implant (2024) — modular .NET framework for screenshots, keylogging, password harvesting, reverse shell, and payload delivery; ModuleInstaller downloader; ClickOnce-based delivery chain (2025 diplomat campaign); shellcode-based loaders replacing mshta.exe; consistent domain infrastructure matching impersonated institutions.
view full profile
TT
Transparent Tribe / APT36
Pakistan — ISI-linked (assessed)
nation-state
active
Pakistan's primary assessed offensive cyber unit, conducting sustained long-term espionage against Indian government, military, defense contractors, and academic institutions since at least 2013. Not particularly sophisticated, but exceptionally persistent and geopolitically aware — campaigns are consistently timed to regional events, with lures weaponizing real incidents including the April 2025 Pahalgam terror attack within days of occurrence. Active through early 2026, with confirmed campaigns against Indian Air Force and Department of Defense Production entities using ISO payloads, cross-platform RATs, and cloud-hosted C2 infrastructure.
expand profile
active since~2013 (ongoing — confirmed campaigns January 2026)
also known asProjectM, COPPER FIELDSTONE, Mythic Leopard, Earth Karkaddan, C-Major, Green Havildar, Storm-0156
primary motivationIndian government and military espionage / South Asia regional intelligence
mitre groupG0134
primary targets
Indian military / defense contractors
Indian government / diplomatic
Indian Air Force (IAF)
Academia / research institutions
Afghanistan (secondary)
typical methods
Spearphishing with geopolitically-timed lures — real military events, terror incidents, and government advisories weaponized within days; Crimson RAT (longstanding), CapraRAT (Android), ElizaRAT (Windows, 2023–present) — uses India Standard Time check on execution to confirm target geography; ElizaRAT C2 channels rotate through Telegram, Slack, Google Drive, and direct VPS; ApolloStealer payload for data exfiltration; malicious ISO images targeting IAF entities (2024); LNK files disguised as PDFs triggering mshta.exe chains; cross-platform tooling in Python, Golang, and Rust (2024 evolution); fake National Informatics Centre (NIC) and Kavach authentication portals for credential harvesting; DLL sideloading; Android APKs delivered as surveillance apps targeting military and diplomatic personnel; campaigns "Gopher Strike" and "Sheet Attack" used Google Sheets and Firebase for C2; OPSEC failures in early campaigns inadvertently confirmed Pakistani operator locations via timezone and infrastructure artifacts.
view full profile
BI
BITTER / T-APT-17
South Asia — state-suspected (India-nexus assessed)
nation-state
active
A South Asian espionage group — assessed by Proofpoint with high likelihood as operating on behalf of an Indian intelligence organization — conducting long-running campaigns against Pakistan, China, Bangladesh, and Saudi Arabia. Known for targeting an exceedingly narrow set of high-value individuals within defense, government, and military entities. Active through mid-2025, including a May 2025 campaign against Pakistan Telecommunication Company timed to India's Operation Sindoor military action, using credentials stolen from Pakistan's Counter Terrorism Department months earlier.
expand profile
active since~2013 (ongoing — PTCL campaign confirmed May 2025)
also known asT-APT-17, APT-C-08, TA397, Hazy Tiger, Orange Yali, APT-Q-37
primary motivationPakistan, China, and Bangladesh government targeting / defense and energy sector espionage
mitre groupG1002
primary targets
Pakistan government / military / telecom
Chinese government / defense
Bangladesh (Rapid Action Battalion)
Saudi Arabia
Turkey (expanding 2024–2025)
typical methods
Spearphishing via free email providers (163.com, 126.com, ProtonMail) and compromised government accounts; malicious RTF documents exploiting Office Equation Editor vulnerabilities (CVE-2017-11882, CVE-2018-0798, CVE-2018-0802); WmRAT and MiyaRAT custom backdoors (2024 Turkey expansion); ZxxZ Trojan; Dracarys Android spyware; IQY file attachment abuse (May 2025 PTCL campaign); pre-positioned access via infostealer-compromised credentials — CTD email account used in PTCL attack was first compromised August 2024 by StealC; IST timezone activity patterns confirm Indian origin; targets an exceedingly small subset — senior officials, specific military units (Bangladesh RAB), 5G engineers, satellite communication specialists — indicating granular pre-operation intelligence.
view full profile
ST
Sea Turtle / Cosmic Wolf
Turkey — state-linked (assessed)
nation-state
active
Turkey's primary assessed offensive cyber unit, distinguished by a signature technique that attacks the internet's naming infrastructure itself rather than individual targets. Sea Turtle compromises DNS registrars and ccTLD managers — then hijacks DNS resolution for the actual targets, silently redirecting their traffic to attacker-controlled servers to harvest credentials at scale. Microsoft noted in 2021 that the group's targeting consistently aligns with Turkish foreign policy interests in Armenia, Cyprus, Greece, Iraq, and Syria. More recently confirmed targeting Kurdish opposition groups — including PKK-affiliated websites — and IT and telecom companies in the Netherlands used as upstream access points into Kurdish political networks.
expand profile
active since~2017 (ongoing — cloud credential campaigns confirmed 2024–2025)
also known asTeal Kurma, Marbled Dust, SILICON, UNC1326, Cosmic Wolf
primary motivationDNS hijacking / intelligence collection / Kurdish opposition surveillance
mitre groupG0120 / G1041
primary targets
DNS registrars / ccTLD managers
ISPs / telecom (Netherlands, MENA)
Kurdish opposition / PKK-affiliated
Armenia, Cyprus, Greece, Iraq, Syria
Cloud environments (AWS / Azure)
typical methods
DNS hijacking via compromise of upstream DNS registrars and ccTLD managers — redirects victim traffic to actor-controlled servers for credential harvesting before passing traffic to legitimate destination; island-hopping via IT and telecom supply chain to reach downstream targets; SnappyTCP reverse shell for Linux/Unix persistence (2023 Netherlands campaigns); cloud environment access using stolen AWS IAM keys or Azure Entra ID credentials with CLI-based manipulation of security groups; CVE-2025-27920 in Output Messenger exploited since April 2024; tools hosted on public GitHub (basic operational security); entire email archives exfiltrated from Kurdish political organizations; political espionage focus — tracking dissidents, opposition figures, and minority groups rather than destructive operations or financial gain.
view full profile
RE
RedEcho
China — state-sponsored
nation-state
active
A Recorded Future designation for Chinese state-sponsored activity targeting India's power grid infrastructure — notable because the targeting makes no economic or intelligence-gathering sense by conventional APT metrics. Recorded Future assessed the campaign is instead likely pre-positioning: establishing persistent access to India's electrical dispatch systems to enable future geostrategic signaling, influence operations, or kinetic escalation options during border disputes. Active from at least 2020, with targets geographically concentrated in North India near the Ladakh border region — the active flashpoint in India-China territorial tensions. Infrastructure and tooling overlaps with APT41 and Tonto Team but remains tracked as a distinct activity group.
expand profile
active since~2020 (ongoing — successor TAG-38 activity confirmed 2022; continued pre-positioning assessed)
also known asRedEcho (Recorded Future designation) — no MITRE ATT&CK group assigned; related activity tracked as TAG-38
primary motivationIndian power grid pre-positioning / critical infrastructure access for strategic leverage
mitre groupUnassigned
primary targets
Indian State Load Despatch Centres (SLDCs)
Regional Load Despatch Centres (RLDCs)
Indian ports
National emergency response systems
North India / Ladakh border region
typical methods
ShadowPad modular backdoor (privately shared across multiple PLA and MSS-linked groups) deployed via compromised internet-facing DVR and IP camera devices used as C2 nodes; FastReverseProxy (FRP) open-source tool for tunneling; PlugX malware C2 infrastructure provisioned in advance of the May 2020 border skirmishes — suggesting deliberate pre-operation infrastructure staging timed to geopolitical events; AXIOMATICASYMPTOTE C2 server infrastructure with distinctive HTTP header fingerprints enabling Recorded Future's network traffic attribution; infrastructure overlaps with APT41/Barium and Tonto Team DDNS domains; high-volume sustained network traffic from Indian power stations to RedEcho servers detected via large-scale automated network telemetry analysis; Recorded Future pre-notified Indian government authorities prior to public disclosure.
view full profile
F6
FIN6
Eastern Europe — organized crime
cybercrime
active
A financially motivated Eastern European crew whose evolution traces the entire arc of modern payment card crime: from point-of-sale malware in hospitality and retail (2015), to Magecart JavaScript skimmers on e-commerce checkout pages (2018), to ransomware partnerships with Ryuk and LockerGoga (2019), to their current tactic of flipping the LinkedIn job scam — posing as job seekers rather than recruiters to deliver the More_eggs backdoor to HR professionals and hiring managers. The June 2025 campaign hosted fake resume portfolio sites on AWS infrastructure behind CAPTCHA gates and environmental fingerprinting checks to block automated scanners.
expand profile
active since~2015 (ongoing — LinkedIn/AWS campaign confirmed June 2025)
also known asITG08, Skeleton Spider, GOLDSTEIN, Magecart Group 6, TAAL, Camouflage Tempest, Gold Franklin, TA4557
primary motivationFinancial — payment card theft / enterprise ransomware / credential theft
mitre groupG0037
primary targets
Retail / hospitality (POS systems)
E-commerce merchants
HR / recruiters (2025 campaign)
Multinational corporations
US and European enterprises
typical methods
Phase 1 (POS era): Trinity and FrameworkPOS malware targeting retail and hospitality point-of-sale terminals; Phase 2 (Magecart): malicious JavaScript injected into e-commerce checkout pages to harvest card data in real time; Phase 3 (ransomware): partnered with TrickBot gang using Anchor Framework; deployed Ryuk and LockerGoga ransomware; Phase 4 (current — 2025): impersonates job seekers on LinkedIn and Indeed, builds rapport with recruiters, then sends phishing emails with no clickable links — forces manual URL entry to bypass filters; AWS-hosted fake portfolio sites with CAPTCHA and environmental fingerprinting (blocks VPN, Linux/macOS) before serving malicious ZIP; ZIP contains LNK file executing More_eggs JavaScript backdoor via wscript.exe; More_eggs (developed by Venom Spider/Golden Chickens as MaaS) runs in memory for stealth, enables credential theft, remote execution, and ransomware delivery; stolen card data historically sold on JokerStash.
view full profile
F8
FIN8 / Syssphinx
Eastern Europe — organized crime
cybercrime
active
A financially motivated Eastern European crew known for two defining behaviors: targeting the hospitality sector with POS malware since 2016, and taking deliberate extended breaks between campaigns to retool and evade detection. Active since 2016, FIN8 has evolved through three distinct phases — POS credential theft, pivot to ransomware partnerships (Ragnar Locker, White Rabbit, BlackCat/ALPHV), and continuous backdoor development — each time rewriting core tooling to shed prior signatures. The Sardonic backdoor has been overhauled multiple times since its 2021 discovery, with the December 2022 variant so heavily reworked that most of the code bore no resemblance to its predecessor.
expand profile
active since~2016 (ongoing — last confirmed activity December 2022; assessed active)
also known asSyssphinx, White Rabbit operators (tooling overlap), ATK113
primary motivationFinancial — POS intrusions / hospitality sector / ransomware deployment
mitre groupG0061
primary targets
Hospitality / restaurants
Retail / entertainment
Insurance / technology / chemicals
Financial services
US and global enterprises
typical methods
Spearphishing and social engineering for initial access; PUNCHTRACK and PUNCHBUGGY/PowerSniff POS scraping malware; WMI-spawned cmd.exe execution to evade parent-child process detection; BADHATCH backdoor (2019, updated 2020–2021); Sardonic C++ backdoor (2021) — modular plugin system for loading additional DLL payloads; Sardonic extensively rewritten in December 2022 to plain C implementation to shed C++ library signatures; living-off-the-land tactics (PowerShell, WMI) throughout; ransomware deployments: Ragnar Locker (June 2021), White Rabbit (January 2022), BlackCat/ALPHV/Noberus (December 2022); group deliberately takes extended operational breaks to refine TTPs before resurging — a deliberate counter-detection strategy that has extended its operational lifespan across nearly a decade.
view full profile
T5
TA505
Russia / Eastern Europe — organized crime
cybercrime
active
Assessed as the largest phishing and malspam distributor in the world, responsible for some of the most impactful ransomware campaigns of the past decade. TA505 drove the Dridex banking trojan and Locky ransomware campaigns through the Necurs botnet, then pivoted to Clop ransomware — culminating in the May 2023 MOVEit Transfer zero-day mass exploitation that hit thousands of organizations simultaneously, including multiple US government agencies. The group operates as a near-enterprise criminal infrastructure, running its own initial access broker operation and frequently rotating malware families to maintain volume and evade detection.
expand profile
active since~2014 (ongoing — MOVEit exploitation confirmed 2023; assessed active)
also known asHive0065, GRACEFUL SPIDER, SectorJ04, Lace Tempest, FIN11, Gold Tahoe, Chimborazo, Spandex Tempest, DEV-0950
primary motivationFinancial — large-scale malware distribution / Clop ransomware / zero-day exploitation
mitre groupG0092
primary targets
Financial / banking
Healthcare
Retail / hospitality
Government agencies (US, global)
Managed file transfer users (MOVEit, GoAnywhere)
typical methods
Massive phishing and malspam campaigns via Necurs botnet delivering Dridex and Locky; frequent malware rotation to evade detection — Dridex, Locky, Philadelphia, GlobeImposter, ServHelper, FlawedGrace, FlawedAmmyy, SDBbot, Get2 downloader; Clop ransomware deployment with double-extortion data leak pressure; zero-day exploitation of managed file transfer platforms: GoAnywhere MFT (2023), MOVEit Transfer (May 2023 — mass exploitation affecting 3,000+ US organizations and 8,000+ globally including US government agencies); Raspberry Robin worm for lateral spread; Cobalt Strike post-exploitation; LemurLoot web shell; initial access broker (IAB) store selling stolen credentials to other threat groups; HTML smuggling and ISO/VHD delivery (replacing macros); Lace Tempest affiliate mode: mass file transfer server exploitation for data theft without full ransomware deployment.
view full profile
WS
Wizard Spider / TrickBot Group
Russia — organized crime (St. Petersburg)
cybercrime
active
The criminal enterprise that built modern big-game hunting ransomware. Starting with TrickBot as a banking trojan in 2016, Wizard Spider constructed a full-stack cybercrime operation: TrickBot for initial access and credential theft, Ryuk for high-ransom targeting, then Conti as a scaled RaaS, and Black Basta after Conti's 2022 collapse. The group employed ~80 people across development, operations, and a custom VoIP call center used to pressure non-paying victims. In May 2025, German authorities publicly identified "Stern" — Wizard Spider's leader — as 36-year-old Russian national Vitaly Nikolaevich Kovalev. He remains at large in Russia.
expand profile
active since~2016 (ongoing — Black Basta successor operations active; 2025 healthcare targeting confirmed)
also known asGOLD BLACKBURN, DEV-0193, Periwinkle Tempest, UNC2053, GRIM SPIDER (Ryuk/Conti cell)
primary motivationFinancial — TrickBot / ransomware ecosystem / big-game hunting enterprise
mitre groupG0102
primary targets
Healthcare / hospitals
Financial services
Critical infrastructure (US, global)
Manufacturing / logistics
Large enterprises (all sectors)
typical methods
TrickBot banking trojan (2016) — modular loader evolved from credential theft to enterprise ransomware delivery vehicle; BazarLoader/BazarBackdoor for stealthy network access; Ryuk ransomware (2018 — GRIM SPIDER cell) introducing big-game hunting model; Conti RaaS (2020) — full-scale affiliate program with ADVobfuscator-compiled payloads, code regularly restructured to evade signatures; data exfiltration via Rclone/Mega pre-encryption for double extortion; AnchorDNS/AnchorMail C2 frameworks; Cobalt Strike for lateral movement; custom VoIP call center for victim pressure campaigns; BazaCall phone-based malware delivery; Black Basta (2023 post-Conti) — continuation of BGH model; February and September 2023 US/UK sanctions named 18 individual operators; leader "Stern" (Vitaly Kovalev) identified May 2025, currently at large in Russia.
view full profile
CA
Carbanak Group
Russia / Ukraine — organized crime
cybercrime
active
The group that executed what Kaspersky called the "Great Bank Robbery" — an estimated $1 billion stolen from over 100 financial institutions across 30 countries by targeting bank employees rather than customers. Carbanak's operators would spend months inside a bank network using screen recording malware to study exactly how administrators processed transactions, then replicate those actions to quietly drain accounts, inflate balances, and trigger ATM jackpotting at precise times. The group later pivoted to US hospitality and restaurant chains via a phone-based social engineering tactic, calling as customers and staying on the line until malware delivery was confirmed.
expand profile
active since~2013 (ongoing — Carbanak malware redetected in IDATLOADER campaigns 2024)
also known asAnunak, GOLD NIAGARA, Carbon Spider — operationally overlaps with FIN7 and Cobalt Gang subgroups
primary motivationFinancial — banking fraud / ATM jackpotting / restaurant and hospitality POS theft
mitre groupG0008
primary targets
Banks / financial institutions (100+ globally)
ATM networks
US restaurant chains
Hospitality / retail / POS operators
Russia, US, Germany, China, Ukraine (primary)
typical methods
Spearphishing with malicious Office documents (Word .doc and Control Panel Applet .cpl) to infect bank employee workstations; Carbanak/Anunak RAT for persistent access — enables remote desktop, credential theft, email search, screen/video recording of administrator activity; operators study captured footage to understand exact transaction workflows before acting; ATM jackpotting via programmed cash dispense at timed intervals with money mules on-site; Oracle database manipulation to inflate account balances; SWIFT money transfer abuse; restaurant/hospitality pivot: phone social engineering posing as customers, email attachment delivered during call, operators remain on phone until infection confirmed; kldconfig.exe, kldconfig.plug, runmem.wi.exe toolset; Google Docs used for C2 communication; Carbanak source code leaked 2019 — now distributed via IDATLOADER loader (Kroll, 2024); arrest of alleged mastermind in Spain, March 2018 — operations continued.
view full profile
SG
Silence Group
Russia — organized crime
cybercrime
active
A small Russian-speaking crew — assessed to be just two people, a developer and an operator — that graduated from failed copycat attacks in 2016 to sophisticated global bank heists totaling an estimated $4.2 million by 2019. Group-IB assessed the members are likely former white-hat security professionals who crossed over, given their access to non-public malware samples, penetration testing tradecraft, and knowledge of ATM internals. Named for the long gaps between operations and the near-silence of attacks in progress. The May 2019 Dutch-Bangla Bank ATM jackpotting operation in Bangladesh — $3 million withdrawn over a single weekend — demonstrated the group's ability to execute multi-country coordinated cash-out operations at scale.
expand profile
active since~2016 (last confirmed major activity 2019–2020; status uncertain)
also known asWHISPER SPIDER, GOLD FRANKLIN — TrueBot/Silence.Downloader developer linked to TA505 infrastructure
primary motivationFinancial — banking sector intrusions / ATM jackpotting / card processing fraud
mitre groupG0091
primary targets
Banks (Russia, Ukraine, CIS primary)
Bangladesh, India, South Korea
UK, Chile, Ghana, Bulgaria
ATM networks
Card processing systems
typical methods
Large-scale reconnaissance phishing (170,000+ emails in three campaigns) to validate bank employee addresses before payload delivery; malicious Office documents with macros for initial access; TrueBot/Silence.Downloader loader (first stage) — completely rewritten multiple times in response to researcher detection; Ivoke fileless PowerShell loader (2019); Silence.Main backdoor for persistent bank network control; Atmosphere Trojan for ATM jackpotting — injects DLL into legitimate atmapp.exe to dispense cash on demand; xfs-disp.exe ATM control program; card processing system compromise enabling withdrawal limit removal across all connected ATMs; money mules dispatched to ATMs at coordinated times; attacks conducted over single weekends to maximize cash extraction before detection; living-off-the-land techniques throughout; TrueBot developer fingerprint linked to TA505 infrastructure by code analysis.
view full profile
MZ
Maze Team / Twisted Spider
Eastern Europe — ransomware operators
ransomware
dormant
The group that fundamentally changed ransomware economics by inventing double extortion. Before Maze, ransomware was defeatable with backups. Maze changed that: in November 2019 the operators contacted BleepingComputer to announce they had stolen Allied Universal's unencrypted data before encrypting it — and would publish it if the ransom went unpaid. When Allied didn't pay, Maze published the data. Within months the tactic had been adopted by REvil, Conti, Clop, and DoppelPaymer. Maze shut down in November 2020 with a self-aggrandizing press release, but operators almost immediately resumed under Egregor, a near-identical ransomware variant.
expand profile
active since~2019 (Maze shutdown November 2020; continued as Egregor; assessed dormant)
also known asTwisted Spider, GOLD VILLAGE — Egregor ransomware successor; originally ChaCha ransomware
primary motivationFinancial — double extortion ransomware / data theft / leak-site extortion
mitre groupUnassigned
primary targets
Enterprise / large organizations
Manufacturing / technology
Healthcare
Government
Allied Universal, Cognizant, Canon, LG, Xerox (confirmed)
typical methods
Double extortion — data exfiltration before encryption enables ransom demands for both decryption key and data suppression, neutralizing backup-based defenses; Maze News dedicated leak site for publishing non-paying victims' data and issuing press releases; exploit kit distribution (Spelevo, Fallout) and phishing for initial access; RDP exploitation; RSA + ChaCha20 file encryption; profit-sharing affiliate model confirmed by Mandiant — FIN6 documented working with Maze to monetize intrusions; Maze Cartel (June 2020) — formal partnership with LockBit, Ragnar Locker, SunCrypt to share tactics and leak infrastructure; shutdown press release November 2020 denied cartel existence, warned of future "radical psychos" threatening infrastructure; Egregor ransomware emerged September 2020 with near-identical code before Maze official closure — strong indicator of operational continuity.
view full profile
HV
Hive Ransomware Group
Unknown (Russian-language, RaaS operation)
ransomware
dismantled
The subject of one of the most operationally significant law enforcement actions in ransomware history. After the FBI infiltrated Hive's infrastructure in July 2022 — seven months before the public announcement — agents quietly obtained over 1,000 decryption keys and passed them to victims, preventing $130 million in ransom payments. During the infiltration, Hive continued attacking healthcare systems, hospitals, and critical infrastructure. Attorney General Garland cited the case of a Midwestern hospital forced to turn away patients at the height of the COVID-19 surge after a Hive attack. On January 26, 2023, the DOJ announced the takedown alongside 13 international partners.
expand profile
active sinceJune 2021 — dismantled January 26, 2023 (FBI infiltration began July 2022)
also known asHive (no widely adopted alternative designations)
primary motivationFinancial — RaaS double extortion / healthcare and critical infrastructure targeting
mitre groupUnassigned
primary targets
Healthcare / hospitals (primary)
School districts
Financial firms
Critical manufacturing
1,500+ victims in 80+ countries
typical methods
RaaS model — administrators develop ransomware and infrastructure, recruit affiliates who conduct intrusions and receive 80% of ransom; phishing with malicious attachments; stolen credentials; RDP exploitation; VPN exploitation; internet-facing device vulnerability exploitation; double extortion — data exfiltrated before encryption, ransom demanded for both decryption key and data suppression; most sensitive victim data specifically targeted to maximize payment pressure; dark web leak site for non-paying victims; 80:20 affiliate revenue split; no contractual healthcare exclusion unlike some RaaS operations; FBI infiltration July 2022 — agents obtained 300 active decryption keys preventing ongoing victim payments and 1,000+ keys for prior victims; servers seized January 2023; five alleged members arrested in Ukraine by Europol November 2023 including the alleged leader, a 32-year-old; $10 million US State Department bounty for links to foreign government.
view full profile
AL
AvosLocker
Unknown — RaaS operation
ransomware
dormant
A RaaS operation that emerged in mid-2021 targeting US critical infrastructure sectors — financial services, critical manufacturing, and government facilities — with confirmed FBI activity through May 2023. AvosLocker combined a layered extortion model with live pressure tactics: operators would phone victims during negotiations to encourage ransom payment and, when victims were uncooperative, threatened and executed DDoS attacks as additional leverage. A notable technical signature was forcing victim systems to restart in Windows Safe Mode before encrypting — disabling security software that cannot operate in that mode.
expand profile
active since~2021 (dormant — last confirmed FBI activity May 2023; leak site offline July–August 2023)
also known asAvosLocker (no widely adopted alias)
primary motivationFinancial — RaaS double extortion / US critical infrastructure targeting
mitre groupUnassigned
primary targets
US critical infrastructure
Financial services / manufacturing
Government facilities
UK, Germany, Spain, UAE, Canada
Organizations capable of meeting ransom demands
typical methods
Phishing, stolen credentials, RDP, and VPN exploitation for initial access; Zoho ManageEngine ADSelfService Plus vulnerability (CVE-2021-40539), Log4Shell, Atlassian Confluence OGNL injection (CVE-2022-26134) exploitation; AnyDesk remote administration tool as backdoor access vector — notably configured to run in Safe Mode; Safe Mode restart evasion — system rebooted, specific security drivers disabled, then AnyDesk and ransomware execute before defenses restore; AES + RSA key encryption; data exfiltration via FileZilla and Rclone before encryption for double extortion; phone calls to victim organizations during ransom negotiations; DDoS attacks against non-cooperating victims as additional coercion; Cobalt Strike and Sliver for C2; Mimikatz and Lazagne for credential harvesting; Ligolo and Chisel for network tunneling; NetMonitor.exe persistence tool masquerading as legitimate network monitoring; operators manage ransom negotiation and leak site centrally while affiliates conduct intrusions.
view full profile
CU
Cuba Ransomware Group
Russia — RaaS operation (despite the name)
ransomware
active
A Russia-based ransomware operation that uses Cuban Revolution iconography despite having no connection to Cuba — first active as Tropical Scorpius in 2019, later adopting the Cuba branding. Distinguished by technical depth: operators developed custom kernel drivers signed with certificates leaked in the 2022 Lapsus$ NVIDIA breach, used them to terminate specific security product processes before deploying ransomware, and leveraged a custom RAT (RomCom) for post-intrusion activity. By 2022 the group had netted at least $43.9 million in ransom payments and demanded at least $74 million from over 60 confirmed victims across government, financial services, and critical infrastructure.
expand profile
active since~2019 (ongoing — Tropical Scorpius rebranded to additional ransomware families post-2023)
also known asTropical Scorpius, UNC2596 — Tropical Scorpius also linked to Industrial Spy, Underground, and Trigona ransomware operations
primary motivationFinancial — RaaS double extortion / financial, government, and critical infrastructure targeting
mitre groupUnassigned
primary targets
Financial services
Manufacturing / construction
Government agencies
Healthcare
US, Canada, Europe (primary)
typical methods
Hancitor malware downloader via malicious email attachments for initial access; Microsoft Exchange ProxyShell and ProxyLogon exploitation; RDP compromise via stolen credentials; custom kernel driver (ApcHelper.sys) signed with NVIDIA certificate leaked by Lapsus$ — drops via dropper that terminates named security product processes (Sophos, ALsvc, McsAgent, SAVAdminService, etc.) by injecting kernel-level code; CVE-2022-24521 CLFS privilege escalation to SYSTEM; Kerberos ticket harvesting via GetUserSPNs.ps1 and KerberCache custom tool; RomCom RAT for post-intrusion persistence, data exfiltration, and process harvesting; double extortion via Cuba leak site — paid section also allows purchasing of specific victim data; Montenegro government attack September 2022: 150 workstations across 10 government institutions; FBI confirmed at least $43.9 million in ransom payments and $74 million in demands.
view full profile
8B
8Base
Unknown — RaaS operation
ransomware
dismantled
A prolific RaaS operation built on Phobos ransomware infrastructure that became one of the most active groups targeting small and medium-sized businesses in 2023. Operating quietly from March 2022, 8Base went public with a data leak site in June 2023 and rapidly escalated — indiscriminately targeting healthcare, finance, manufacturing, and government sectors across the US and globally, and claiming a 2024 attack on the UN Development Programme. Law enforcement Operation Phobos Aetor dismantled the group in February 2025, arresting four Russian nationals in Phuket, Thailand and seizing 27 servers. Japanese authorities subsequently released a free decryptor for victims.
expand profile
active since~2022 (dismantled — Operation Phobos Aetor, February 2025; free decryptor released)
also known as8Base (no widely adopted alias) — operators also ran "Affiliate 2803"; overlap with RansomHouse noted
primary motivationFinancial — double extortion / SMB targeting across multiple sectors
mitre groupUnassigned
primary targets
Small / medium businesses (SMBs)
Healthcare / hospitals
Finance / manufacturing / IT
Government / education
US (primary), Brazil, global
typical methods
Phishing emails and initial access brokers for initial access; SmokeLoader delivery in some campaigns; RDP exploitation and IP scanning (Angry IP Scanner); Phobos ransomware variant with .8base or .eight file extensions; AES-256 CBC encryption; double extortion — data exfiltration before encryption with TOR-based leak site launched May 2023; Windows Defender Firewall disabled via firewall rule modification; Volume Shadow Copy deletion to prevent recovery; Recovery Mode disabled in Startup Policy; cryptocurrency mixing services to obscure ransom payments; self-described as "honest and simple pentesters" on leak site claiming to target only organizations that neglect data privacy; 1,000+ confirmed victims extorting $16 million total; code overlap with Phobos initially ~100% but reduced as group reinvested ransom proceeds in development; four leaders arrested in Phuket, Thailand February 2025 — two named as Roman Berezhnoy (33) and Egor Glebov (39), both Russian nationals; 27 servers seized; free decryptor released by Japanese law enforcement post-takedown.
view full profile
HI
Hunters International
Unknown — Hive ransomware code reuse
ransomware
active
Emerged in October 2023 with code showing approximately 60% overlap with the FBI-dismantled Hive ransomware — operators deny a rebrand, claiming they purchased the source code. Within a year became one of the most active RaaS operations globally, claiming 280+ attacks across 30+ countries. In November 2024 the operators issued a farewell letter citing ransomware as too risky and unprofitable — then reversed course weeks later, relaunching on January 1, 2025 as World Leaks, dropping encryption entirely in favor of pure data extortion. The group now operates an exfiltration-as-a-service model, arming affiliates with an automated data theft tool and threatening data publication rather than system lockout.
expand profile
active since~2023 (ongoing — rebranded as World Leaks January 2025; extortion-only model)
also known asWorld Leaks (January 2025 rebrand) — operators deny direct Hive lineage but code overlap confirmed
primary motivationFinancial — double extortion / data exfiltration and leak / shifting to encryption-free extortion
mitre groupUnassigned
primary targets
Healthcare (Fred Hutch Cancer Center, ICBC London)
Manufacturing / logistics
Financial services / automotive
Education / government
30+ countries — opportunistic targeting
typical methods
CVE-2024-55591 FortiOS/FortiProxy authentication bypass exploitation (February 2025 campaign); RDP lateral movement post-initial access; Rclone and WinSCP data exfiltration; Rust-based ransomware supporting Windows, Linux, FreeBSD, SunOS, and VMware ESXi on x64, x86, and ARM; 60% code overlap with Hive v61 — improved encryption key management, reduced command-line verbosity; SharpRhino custom backdoor with valid code certificate masquerading as AngryIP (2024); Volume Shadow Copy deletion via vssadmin.exe and wmic.exe; encryption keys embedded within encrypted files; Software Storage / World Leaks exfiltration tool for automated data theft; encryption dropped entirely in late 2024/early 2025 — no ransom notes, no file extension changes; operators contact CEOs and IT teams directly rather than dropping ransom notes to maximize payment likelihood; December 2024 Fred Hutch Cancer Center breach threatening 800,000+ cancer patient records; September 2024 ICBC London — 5.2 million files, 6.6 TB stolen.
view full profile
IC
INC Ransom
Unknown — financially motivated
ransomware
active
One of the most prolific healthcare-targeting ransomware groups through 2024 and 2025 — leading confirmed attacks on healthcare providers across both years according to Comparitech tracking. INC Ransom's UK NHS campaigns were particularly impactful: the March 2024 attack on NHS Scotland (Dumfries and Galloway) exposed 3TB of patient data including genetics reports, medication records, and children's test results. The November 2024 attack on Alder Hey Children's Hospital in Liverpool — accessed via a shared digital gateway — compromised patient records, donor reports, and procurement data spanning six years across three hospital trusts.
expand profile
active since~2023 (ongoing — led healthcare ransomware claims in 2024 and 2025)
also known asGOLD IONIC (Sophos designation) — no widely adopted alias
primary motivationFinancial — double extortion targeting healthcare, education, and critical services
mitre groupUnassigned
primary targets
Healthcare / hospitals (primary)
NHS trusts (UK)
Education
Financial / pharmaceutical
US, UK, Australia, Germany
typical methods
Double extortion — data exfiltration and encryption with dark web leak site for non-paying victims; vulnerability exploitation, phishing, stolen credentials, and brute force for initial access; "proof pack" publication of sensitive clinical records to pressure victims; supply chain and shared service entry — Alder Hey breach achieved via compromised "digital gateway service" shared across multiple hospital trusts; NHS Scotland (Dumfries and Galloway) March 2024: 3TB stolen including genetics reports, medication records, letters between clinicians, and children's clinical data; Alder Hey November 2024: patient records, donor reports, procurement data from three hospital trusts; attacks on healthcare businesses include Singular Genomics and Deerfield Management with 20.1 TB claimed stolen; ranked #1 for confirmed ransomware claims against healthcare providers in both 2024 and 2025 (Comparitech); Sophos tracked as GOLD IONIC; UK government policy is not to pay ransoms though payment is not illegal.
view full profile
FG
Fog Ransomware
Unknown — assessed Russian origin (closed RaaS)
ransomware
active
Emerged April 2024 as an education-sector specialist built on compromised VPN credentials — 80% of early victims were US schools and universities. Fog distinguished itself by operational speed: the shortest observed time from initial access to full encryption was under two hours. Researchers note it as a variant rather than a group, separating encryptor developers from the hands-on operators deploying it. A November 2024 Arctic Wolf analysis of 30 Fog intrusions found all initiated through compromised SonicWall VPN accounts, with 75% of the same intrusions also linked to Akira — suggesting shared infrastructure between the two groups.
expand profile
active since~2024 (ongoing — 87 attacks in 2024; continued activity 2025)
also known asFog (no widely adopted alias) — infrastructure overlaps with Akira; assessed Russian origin (avoids Eastern European and Chinese targets)
primary motivationFinancial — double extortion targeting education, technology, and financial sectors
mitre groupUnassigned
primary targets
Higher education (US — primary 2024)
Business services / technology
Financial services (expanding 2024–2025)
Manufacturing / government
US (primary), global expansion
typical methods
Compromised VPN credentials as primary initial access — exploits weakly secured remote access in education environments; SonicWall SSL VPN exploitation including CVE-2024-40766; Veeam Backup & Replication vulnerability exploitation (CVE-2024-40711, CVSS 9.8) — strategic targeting of backup infrastructure to undermine recovery; pass-the-hash attacks against administrator accounts; PsExec lateral movement; RDP and SMB for host access; Windows Defender disabled on target servers; Hyper-V VMDK files in VM storage encrypted; Veeam object storage backups deleted; phishing via ZIP files containing malicious LNK shortcuts (PowerShell stage1.ps1 loader); TOR-based data leak site launched July 2024; May 2025 financial sector attack used GC2 (Google Sheets/SharePoint C2), Stowaway proxy tool, and Syteca employee monitoring software — tools previously associated with APT41; sub-2-hour encryption timeline observed; avoids Eastern European and Chinese targets consistent with Russian operator hypothesis.
view full profile
BL
BianLian
Unknown — likely Russia (CIS-based)
ransomware
active
A case study in adversarial adaptation: BianLian started as a double-extortion ransomware group, but when Avast released a free decryptor for their encryptor in early 2023, the operators made a strategic decision to abandon encryption entirely and pivot to pure data extortion. By January 2024, CISA confirmed BianLian had shifted exclusively to exfiltration-based extortion — stealing data, then threatening to publish it without ever locking systems. The FBI/CISA/ASD advisory noted the group likely chose the Chinese name "Bian Lian" (face changing) deliberately to complicate attribution — a cultural reference to the rapid mask-swapping art of Sichuan opera.
expand profile
active since~2022 (ongoing — top-three healthcare threat actor 2024; 90+ victims posted 2024)
also known asBianLian (no widely adopted alias) — FBI/CISA: "likely based in Russia with Russia-based affiliates"
primary motivationFinancial — pure data exfiltration extortion / healthcare and manufacturing focus
mitre groupUnassigned
primary targets
Healthcare (US — primary)
Manufacturing / financial services
Critical infrastructure
US, Australia, Europe
Professional services / property
typical methods
Compromised RDP credentials (from IABs or phishing) as primary initial access; ProxyShell and SonicWall VPN exploitation; Go-language custom backdoor for persistence and lateral movement; Go-language encryptor (retired after Avast published free decryptor early 2023); exclusively exfiltration-based extortion since January 2024 — no encryption, no system lockout; data stolen then threatened for publication; ransom notes printed on victim's own networked printers; threatening phone calls made to individual employees; FTP, Rclone, and Mega for data exfiltration; Ngrok and modified Rsocks SOCKS5 proxy for C2 traffic obfuscation; SessionGopher for remote access credential extraction; CVE-2022-37969 Windows 10/11 privilege escalation; renaming binaries after legitimate Windows services; UPX packing for heuristic evasion; shares a custom .NET tool with Makop ransomware group; joint extortion campaign with White Rabbit and Mario Ransomware groups December 2023; September 2024: Boston Children's Health Physicians breach via IT vendor compromise.
view full profile
NN
NoName057(16)
Russia — pro-Kremlin hacktivism
hacktivism
active
Russia's most prolific state-aligned hacktivist collective — created by CISM (Centre for the Study and Network Monitoring of the Youth Environment) as a covert Kremlin project, with CISM staff developing the DDoSia tool, funding infrastructure, and serving as channel administrators. Active since March 2022, the group has maintained an average of 50 DDoS attacks per day, targeting 3,700+ unique hosts between mid-2024 and mid-2025 alone. Attacks are timed to geopolitical events — NATO aid announcements, weapons transfers, state visits — and gamified via cryptocurrency rewards and leaderboards to sustain a volunteer base of up to 4,000 participants. Operation Eastwood (July 2025) dismantled core servers and resulted in two arrests, but the group publicly dismissed the operation and resumed activity within days.
expand profile
active sinceMarch 2022 (ongoing — resumed operations days after Operation Eastwood July 2025)
also known asNoName057, 05716nnm, DDoSia (project name) — CISA: created by CISM on behalf of the Kremlin
primary motivationPro-Russia DDoS / political retaliation against NATO and Ukraine allies
mitre groupUnassigned
primary targets
Ukraine (29% of targets)
Government agencies (41% of targets)
NATO members (France, Italy, Germany, Poland)
Financial institutions / transport hubs
3,700+ unique hosts July 2024–July 2025
typical methods
DDoSia crowdsourced DDoS platform — volunteers download Go-based tool, receive encrypted target lists from C2 servers, and earn cryptocurrency per completed attack; two-stage C2: Tier 1 ephemeral proxy servers (avg 9-day lifespan) shield Tier 2 backend via ACL; target list delivery uses AES-GCM encryption; new targets released in two daily waves (05:00–07:00 UTC and ~11:00 UTC) aligned with Russian work hours; attack vectors include HTTP GET floods, SYN floods, and Slow Loris connection exhaustion on ports 80 and 443; gamification — leaderboards, shout-outs, and badges recruit younger participants; Telegram channels (52,000+ subscribers) for target announcements, claim responsibility, and mocking victims; collaborated with Cyber Army of Russia Reborn (CARR) mid-2024; co-founded Z-Pentest with CARR in September 2024 — targeting US OT/ICS infrastructure beyond DDoS; Operation Eastwood (July 14–17, 2025): 2 arrests, 7 arrest warrants, 24 house searches across 6 EU countries, 100+ servers seized — group publicly defiant and resumed operations.
view full profile
AS
Anonymous Sudan
Sudan — pro-Russia alignment (assessed)
hacktivism
disrupted
Two brothers from Sudan — Ahmed Salah (22) and Alaa Salah (27) — built one of the most disruptive DDoS operations in recent history using rented servers, high-bandwidth infrastructure, and a custom tool called DCAT (Distributed Cloud Attack Tool). Between January 2023 and March 2024, they executed 35,000+ DDoS attacks globally, taking down Microsoft Azure and Outlook, the French government, US DOJ, DOD, FBI, State Department, and Cedars-Sinai Medical Center's emergency department for eight hours. Security researchers initially theorized Russian state backing — the indictment ultimately confirmed two independent Sudanese nationals, correcting a widely held attribution assumption.
expand profile
active sinceJanuary 2023 — disrupted March 2024 (arrests and DCAT seizure)
also known asSTORM-1359 (Microsoft), LameDuck (Cloudflare) — no confirmed Russian state link despite collaboration with Killnet
primary motivationDDoS attacks / ideological disruption / DDoS-for-hire service advertising
mitre groupUnassigned
primary targets
US government agencies (DOJ, DOD, FBI, State)
Microsoft / major tech platforms
Healthcare (Cedars-Sinai)
France, Sweden, Germany, Australia
Israel / #OpIsrael campaigns
typical methods
DCAT (Distributed Cloud Attack Tool) — Skynet Botnet powering Layer 7 application-layer DDoS via HTTP floods; rented high-bandwidth server infrastructure enabling sustained multi-day attack campaigns; sophisticated bypass techniques defeating commercial DDoS mitigation services; vulnerable API endpoint exploitation to amplify impact; typical attack format: 2-hour timed stints to demonstrate target control without causing permanent damage; Telegram for real-time attack claims, check-status links, and follower engagement; collaborated with Killnet, SiegedSec, and Türk Hack Team; mixed motivations: Islamic and Sudanese nationalist themes alongside pro-Russia alignment; DDoS-for-hire API service developed (attacked GitHub to advertise it January 2024); $10+ million in documented US damages; Ahmed Salah faces maximum life in federal prison; DCAT seized and disabled by FBI in March 2024 — Akamai, AWS, and CrowdStrike assisted in identifying infrastructure providers.
view full profile
IT
IT Army of Ukraine
Ukraine — government-directed hacktivism
hacktivism
active
The world's first government-crowdsourced cyber army — established by Ukraine's Minister of Digital Transformation Mykhailo Fedorov days after Russia's February 2022 invasion. Targets are listed on Telegram; volunteers worldwide contribute computing power and run provided DDoS tools. Russian cybersecurity firm F6 identified the IT Army as the most active hacking group targeting Russian digital infrastructure in 2024, with DDoS attacks surging 50% year-over-year. Operations are coordinated by a small in-house engineering team and a public call-to-action network — structured enough for strategic focus, open enough for tens of thousands of international participants.
expand profile
active sinceFebruary 2022 (ongoing — most active group targeting Russian infrastructure through 2024–2025)
also known asUkrainian IT Army — hybrid state/civilian model; in-house team reportedly includes Ukrainian defense/intelligence personnel
primary motivationPro-Ukraine DDoS and disruption against Russia / wartime asymmetric cyber warfare
mitre groupUnassigned
primary targets
Russian financial sector (34 orgs in 2024)
Russian ISPs / telecom (Lovit, SprintHost)
Russian energy infrastructure
State media and government portals
Border-region providers (Kursk, Belgorod)
typical methods
Volunteer-contributed DDoS infrastructure — "sofa hackers" run provided tools from personal hardware and cloud services; tools hosted on GitHub (selectively permitted while pro-Russian tools removed); scheduled-attack toolkit enabling off-hours contributions; Telegram coordination channel (170,000+ members) posts daily targets; DDoS leaderboard with top contributors running ~350-host infrastructure; coordinated Layer 7 application-layer attacks; attack on Lovit disrupted internet for 200,000 Moscow/St. Petersburg residents and caused $350M stock value drop; June 2024: claimed responsibility for DDoS campaign described as largest in history against Russian banks; targeted CCTV and internet infrastructure during Ukraine's drone strikes on Russian oil refineries to blind surveillance; attacks on Kursk and Belgorod regional telecom operators timed to cross-border military operations; DDoS attacks on St. Petersburg International Economic Forum doubled compared to 2023; legal grey area — foreign volunteer participation raises international law questions.
view full profile
PS
Predatory Sparrow
Israel — state-linked (assessed)
hacktivism
active
A pro-Israel group assessed to have state links — though Israel maintains official ambiguity — that conducts precision-timed destructive attacks on Iranian infrastructure under the guise of hacktivism. Known for restraint as a message: the group emphasizes that it deliberately limits civilian impact while demonstrating capability. In June 2025, within days of Israeli airstrikes on Iranian nuclear sites, Predatory Sparrow destroyed IRGC data at Bank Sepah and stole $90 million from Nobitex — Iran's largest crypto exchange — then burned all of it rather than keeping it, to send a political rather than financial message.
expand profile
active since~2019 (Syrian logistics targets) / 2021 (Iranian infrastructure — ongoing through June 2025)
also known asGonjeshke Darande (Persian: گنجشک درنده) — INDRA (predecessor / code overlap); Israel maintains no official confirmation
primary motivationDestructive attacks on Iranian infrastructure / economic and financial disruption / geopolitical signaling
mitre groupUnassigned
primary targets
Iranian banking (Bank Sepah)
Iranian crypto exchanges (Nobitex)
Iranian rail and transit systems
Iranian steel mills / industrial
Iranian fuel distribution / gas stations
typical methods
Targeted data destruction via wiper malware — selective host discovery during reconnaissance executes only on intended systems (MITRE T1592) to control damage radius; scheduled tasks (T1053.005) and batch scripting (T1059) for multi-stage payload deployment; physically-aware impact design — 2021 Iranian rail attack displayed messages on ticket screens while carefully avoiding train safety systems; 2022 steel mill attacks caused physical fire by triggering industrial control systems; December 2023 gas station campaign disabled majority of Iranian fuel distribution infrastructure; June 2025 Bank Sepah: destroyed IRGC data and disrupted services timed to Israeli airstrikes; June 2025 Nobitex: stole ~$90 million in BTC, ETH, TRON and 100+ cryptocurrencies — then sent all funds to inaccessible "burn" addresses to destroy rather than profit; Nobitex source code and research documentation released publicly; claims made in both Farsi and English presenting as Iranian anti-government activists.
view full profile
WN
Winnti Group
China — state-linked contractor network
apt
active
One of the most structurally complex designations in threat intelligence — "Winnti" refers to a shared malware family, a set of tactics, and a loose contractor network under Chinese intelligence direction rather than a single cohesive group. Microsoft broke it into BARIUM (gaming / multimedia targeting, personal financial gain) and LEAD (industrial espionage, state mandate). The defining capability is supply chain compromise: stealing code signing certificates from gaming companies to legitimize later trojanized software distribution — a technique that underpins operations like ShadowHammer (ASUS) and the Netsarang supply chain attack. Confirmed active in March 2024 (RevivalStone campaign against Japanese manufacturing).
expand profile
active since~2010 (some sources trace to 2007; ongoing — RevivalStone Japan campaign March 2024)
also known asBARIUM, LEAD, Blackfly, Bronze Atlas, Wicked Panda, APT41 (subset), Winnti Umbrella (collective term for overlapping groups)
primary motivationGaming industry supply chain compromise / state espionage / financially motivated side operations
mitre groupG0044
primary targets
Online gaming companies (Asia, US)
Software vendors (supply chain)
Manufacturing / energy / materials (Japan)
Pharmaceutical / technology
Telecom / government (state mandate)
typical methods
Code signing certificate theft from gaming companies — enables long-dwell trojanized software delivery that evades detection; supply chain attacks via trojanized software updates: ShadowHammer (ASUS Live Update Utility), Netsarang NetSarang (2017); Winnti RAT / Winnti Loader (DLL hijacking → SessionEnv service persistence → rootkit) — updated with Control Flow Flattening obfuscation and ChaCha20/XOR encryption in 2024; SQL injection of ERP systems as initial access (RevivalStone 2024); ShadowPad modular backdoor; PortReuse backdoor (network traffic injection for persistence); BARIUM techniques: social media rapport building, malicious Office macros, .chm and .lnk first stages; LEAD techniques: direct Winnti package email delivery, credential brute force; TreadStone command-and-control framework (referenced in i-Soon leaks); gaming industry attacks conducted outside Chinese business hours — consistent with financially motivated contractor side activity; US DOJ indicted five members 2020, naming Chengdu 404 Network Technology as front company.
view full profile
MP
Mustang Panda / TA416
China — state-sponsored
nation-state
active
One of China's most prolific and consistently active espionage groups, distinguished by high operational tempo and "volume over stealth" targeting philosophy. Campaigns are tightly aligned with PRC foreign policy moments — the 2020 Vatican targeting coincided precisely with the Sino-Vatican bishop appointment agreement renewal; Ukraine war campaigns began within weeks of the 2022 invasion to collect EU internal deliberations on sanctions and foreign policy realignment. Confirmed active through 2025 with new malware families (CoolClient infostealer modules, ToneShell variants, Frankenstein ToneShell, Yokai) and USB worm propagation added to its phishing-heavy infrastructure.
expand profile
active since~2017 (some sources 2012–2014; ongoing — CoolClient campaigns confirmed 2024–2025)
also known asTA416, RedDelta, Bronze President, Earth Preta, Stately Taurus, Camaro Dragon, HIVE0154, Twill Typhoon, LuminousMoth, TANTALUM
primary motivationGovernment and NGO espionage / PRC foreign policy intelligence / diplomatic monitoring
mitre groupG0129
primary targets
Southeast Asian governments
EU diplomatic / foreign ministries
Religious institutions (Vatican, Catholic)
NGOs / think tanks
Myanmar, Philippines, Taiwan, Mongolia
typical methods
Spearphishing with geopolitically-tailored lures (Mongolian themes, EU policy documents, religious affairs decoys); DLL side-loading via trojanized legitimate application installers; PlugX/Korplug backdoor (long-running primary tool); ToneShell backdoor (unique to Mustang Panda — not observed with any other group); ShadowPad modular backdoor; CoolClient backdoor with infostealer modules (credential theft from browsers, clipboard monitoring, cloud-based exfiltration — 2024–2025); PUBLOAD, TONEINS malware families; Google Drive used for payload distribution (fake Google accounts); USB worm propagation (SnakeDisk — added late 2024 complementing phishing operations); 2024 ASEAN-Australia Summit attendees targeted; VSCode abuse for C2 (2024); Bookworm malware revived in 2025 Southeast Asia campaigns; law enforcement dismantled PlugX infrastructure in early 2025 — group retooled with LOTUSLITE backdoor.
view full profile
GA
Gallium / Softcell
China — state-sponsored
nation-state
active
A Chinese state-linked group that built its reputation specifically on telecom sector intrusion — penetrating carrier networks not to steal data from the carriers themselves, but to access the call detail records (CDRs) of high-value targets transiting those networks. Operation Soft Cell (Cybereason's name for Gallium activity) demonstrated sustained network presence inside telecom providers in Southeast Asia, Europe, Africa, and the Middle East, in some cases maintaining access for years. Since 2021 the group has expanded targeting to financial institutions and government entities, and added PingPull — a hard-to-detect remote access trojan — to its arsenal.
expand profile
active since~2018 (Operation Soft Cell; some sources trace activity to 2012; active through 2025)
also known asSoftcell (Cybereason), Granite Typhoon (Microsoft 2025) — code signing certificate overlap with APT41 suggests shared Chinese digital quartermaster
primary motivationTelecom sector espionage / CDR collection / persistent access to carrier networks
mitre groupG0093
primary targets
Telecom carriers (Southeast Asia, Middle East)
Financial institutions (expanding)
Government entities
Europe and Africa (expanding 2023–2024)
Belt and Road Initiative countries
typical methods
Exploitation of unpatched internet-facing services — Microsoft Exchange (ProxyShell, ProxyLogon), SharePoint, VPN appliances; China Chopper web shell and custom IIS-embedded backdoors for initial foothold and persistence; Mimikatz variants (including internally developed mim221 with custom credential dumping logic) for credential harvesting from LSASS; lateral movement via PsExec, WMI, and RDP using harvested credentials; PingPull RAT (2022) — uses ICMP, HTTP, and HTTPS for C2, difficult to detect via traffic inspection alone; CDR (call detail record) collection from telecom switching infrastructure; redundant multi-layer VPN C2 infrastructure for operational resilience; living-off-the-land tactics (PowerShell, WMI) to blend with normal admin traffic; tool and code signing certificate overlap with APT41, APT10, APT27 — consistent with Chinese national digital quartermaster model.
view full profile
LS
LazyScripter
Unknown — suspected Middle East nexus
apt
active
A low-attribution espionage group discovered by Malwarebytes in early 2021 after years of undetected activity — distinguished by a nearly exclusive reliance on commodity open-source RATs rather than custom malware, making attribution difficult by design. Targets two overlapping groups: airline employees and organizations that interact with IATA's BSPLink billing platform, and individuals seeking immigration to Canada through legitimate job programs. Lures are carefully updated to track new IATA products, suggesting ongoing tasking to collect intelligence from the aviation sector specifically. GitHub used as payload hosting infrastructure — a tactic associated with Iranian APT groups.
expand profile
active since~2018 (publicly identified February 2021; infrastructure remained active post-discovery)
also known asLazyScripter (Malwarebytes designation) — suspected Middle East nexus; Koadic tool overlap with MuddyWater and APT28 noted but insufficient for attribution
primary motivationAirline sector targeting / credential and intelligence theft / espionage
mitre groupG0140
primary targets
Airlines and IATA member organizations
BSPLink software users (airline billing)
Canada immigration job seekers
IATA ONE ID contactless processing users
typical methods
Phishing emails delivering malicious ZIP archives and Office documents with embedded executables, batch files, or VBScript — avoiding macros to evade common detection; KOCTOPUS loader deploying Octopus RAT and Koadic post-exploitation framework; earlier campaigns used Empoder loader delivering PowerShell Empire; commodity RAT arsenal: Octopus, Koadic, LuminosityLink, Quasar, njRat, RMS, Remcos — all publicly available; GitHub used for payload hosting (multiple throwaway accounts); free dynamic DNS providers (Duck DNS, FreeDNS) for C2; lures track IATA product releases — BSPLink upgrades, COVID-19 themes, IATA ONE ID contactless passenger processing; lures also target Canadian government immigration job programs on legitimate sites like Canadavisa.com; consistently updates toolset and lures while infrastructure remains active.
view full profile
MC
Machete
Venezuela — state-linked (assessed)
nation-state
active
One of Latin America's longest-running espionage campaigns — active since at least 2010 and confirmed updated through 2019 with continued infrastructure activity. Machete is assessed as Spanish-speaking with roots in Latin America, and focuses heavily on Venezuelan military targets alongside neighboring governments, intelligence services, and embassies. Despite low technical sophistication by APT standards — no zero-days, Python-based tooling, simple phishing — the group has exfiltrated gigabytes of data per week from high-value targets and operated largely unimpeded for over a decade, demonstrating that persistence and targeted lures often outperform technical complexity.
expand profile
active since~2010 (Kaspersky first disclosure 2014; ESET updated variant tracked 2018–2019; Cylance resurgence report with 100GB+ exfiltrated)
also known asEl Machete, APT-C-43, Ragnar — Spanish-speaking; Venezuela state-link assessed but not confirmed
primary motivationLatin American government and military espionage / regional intelligence collection
mitre groupG0095
primary targets
Venezuelan military (75% of victims)
Latin American governments and embassies
Intelligence services / law enforcement
Telecom and power companies
Colombia, Ecuador, Peru, Nicaragua, Cuba
typical methods
Spearphishing emails with military-themed decoy documents (personnel reassignment orders, government communiqués tailored per country); fake blog websites used for web-based malware distribution; Python-based Machete backdoor (continuously updated — first variant 2010, second 2014, third 2017, fourth 2018+ with new features); no zero-day exploits — relies entirely on social engineering; malware capabilities include keylogging, screenshot capture, clipboard monitoring, file exfiltration, USB drive synchronization, and geolocation; 778+ victims globally identified; 300+ unique victims in Latin America in one month-long resurgence with 100GB+ exfiltrated; C2 infrastructure uses dynamic DNS; targets outside Latin America are typically embassies of affected Latin American nations (Russia, Spain, US, Germany).
view full profile
NO
Nomadic Octopus / DustSquad
Russia — state-linked (assessed)
nation-state
active
A Russian-speaking espionage group that has operated quietly across Central Asia and former Soviet states since at least 2014, targeting diplomatic missions, government networks, and opposition political groups. Notably opportunistic in its lure design — when Kazakhstan threatened to ban Telegram in 2018, the group immediately distributed malware disguised as a Telegram alternative for the DVK opposition party. Operation Paperbug (2020–2023) took a more invasive step: infiltrating a Tajikistani mobile carrier to surveil 18 entities, including government officials, and extending access to OT devices such as gas station systems — unusual scope for a diplomatically-focused APT.
expand profile
active since~2014 (some sources 2015; Operation Paperbug active 2020–2023; ongoing)
also known asDustSquad (Kaspersky), Nomadic Octopus (ESET) — Russian-speaking; not assessed as related to Sofacy despite Delphi tool overlap
primary motivationCentral Asia government and diplomatic espionage / former Soviet state surveillance
mitre groupG0133
primary targets
Diplomatic missions / embassies
Central Asian governments (Tajikistan, Kazakhstan, Afghanistan)
Opposition political parties
Telecom providers (carrier-level access)
OT devices / public infrastructure
typical methods
Spearphishing emails with Russian-language malware filenames and regionally relevant lures; Octopus Trojan (Delphi-based) — remote access including command execution, file upload/download, screenshot capture, RAR archive search; malware disguised as Telegram alternative app (2018 Kazakhstan campaign targeting DVK opposition party — exploited government Telegram ban threat); Android and Windows malware variants tracked in parallel; Operation Paperbug: carrier-level telecom infiltration in Tajikistan — spied on 18 entities including senior government officials from within the mobile network; public offensive tools deployed alongside custom backdoors; tools renamed as "Google Update," "Chrome Update," "Java Update," "Google Crash Handler" for camouflage; active surveillance during victim working hours (screenshots during email composition and contract drafting); OT device targeting (gas station systems) alongside government PCs.
view full profile
T2
TA2541
Unknown — assessed criminal or state-aligned
apt
active
One of the most consistent and sector-specific APTs tracked by Proofpoint — active since at least 2017 with almost no change in tactics over eight years. TA2541 exclusively targets aviation, aerospace, transportation, defense, and manufacturing using only industry-specific lure themes (aircraft parts, fuel orders, charter requests, ambulatory flights) rather than current events. Unusually, campaigns hit broad recipient lists without targeting specific job roles, suggesting intelligence-gathering rather than spearfishing. Despite extensive public reporting and IOC disclosure, the group continues operating with the same playbook, implying either high confidence in lure effectiveness or operations that continue to yield value.
expand profile
active since~2017 (ongoing — same TTPs consistently observed through 2024; 1,100+ organizations compromised)
also known asTA2541 (Proofpoint) — activity also tracked by Cisco Talos, Microsoft, Mandiant, Morphisec as Operation Layover and related clusters
primary motivationAviation, aerospace, and defense sector targeting / intelligence collection / unknown ultimate objectives
mitre groupG1018
primary targets
Aviation and aerospace companies
Defense sector (North America, Europe, Middle East)
Transportation and logistics
Manufacturing
typical methods
High-volume phishing emails (hundreds to tens of thousands per campaign) with aviation/transportation lures — aircraft parts requests, charter inquiries, fuel orders, ambulatory flight arrangements; early campaigns: macro-laden Word attachments; current campaigns: links to Google Drive or OneDrive-hosted obfuscated VBS files; VBS executes PowerShell to download RAT payload; WMI used to query and disable security products before installation; AsyncRAT (primary preference), NetWire, WSH RAT, Parallax, Revenge RAT, vjw0rm, LuminosityLink, njRAT, AgentTesla, Imminent Monitor (12+ RAT families total); Discord CDN used for payload hosting (late 2021 onward); DDNS for C2 infrastructure (Netdorm, No-IP); C2 domains contain recognizable keywords: "kimjoy," "h0pe," "grace"; VBS filenames stay on-theme: "flight.vbs," "charter.vbs," "aircraft.vbs"; RAT establishes persistence via startup directory and scheduled tasks; brief COVID-19 lure pivot in spring 2020 then returned to core aviation themes.
view full profile
GW
UNC1151 / Ghostwriter
Belarus — state-linked / Russia-aligned
nation-state
active
A rare publicly documented hybrid of cyber espionage and coordinated influence operations — UNC1151 provides the technical access (credential theft, website compromise) while the Ghostwriter campaign uses those stolen assets to publish fabricated narratives on hacked news sites and government portals. Mandiant assessed with high confidence in 2021 that UNC1151 is linked to the Belarusian government and military based in Minsk, reattributing a campaign Germany and the EU had previously blamed on Russia. The geographic tell is notable: Ghostwriter operations target NATO members bordering Belarus (Lithuania, Latvia, Poland) but have consistently excluded Estonia — a Baltic state that does not share a border with Belarus. Active through 2025 targeting Ukrainian military and Belarusian opposition.
expand profile
active since~2017 (Ghostwriter campaign; UNC1151 espionage tracked since 2017; confirmed active April 2024 targeting Ukraine Ministry of Defence)
also known asGhostwriter (Mandiant/FireEye campaign name), UAC-0057 — Mandiant: operators located in Minsk with links to Belarusian military
primary motivationNATO disinformation / influence operations / credential theft and espionage supporting Lukashenko government interests
mitre groupUnassigned
primary targets
Lithuania, Latvia, Poland (NATO bordering Belarus)
Ukraine (military and government)
Germany (elections influence)
Belarusian opposition and journalists
Ministries of Defence / diplomatic targets
typical methods
Credential harvesting via phishing to spoofed login pages mimicking Facebook, Google, Twitter, regional email providers, government portals; compromised credentials used to hijack official social media accounts and government websites to publish fabricated narratives; Ghostwriter disinformation playbook: false NATO withdrawal claims, nuclear weapons deployment allegations, NATO troops spreading COVID-19, fake stories about Polish-Lithuanian relations, fabricated scandals targeting opposition parties; PicassoLoader downloader toolkit for malware delivery (confirmed 2024–2025 campaigns); Excel macro-laced documents with VBA macros (obfuscated with Macropack and ConfuserEx in 2024); XOR and RC4 payload encryption; DLL side-loading via LNK shortcuts; Ukrainian military targeting using drone imagery lures (April 2024 campaign); fake recruitment notices targeting Polish citizens (Lithuanian-Polish-Ukrainian brigade disinformation 2023); Belarusian state TV amplified Ghostwriter narratives as fact.
view full profile
TT
Tonto Team / CactusPete
China — PLA-linked
nation-state
active
A long-running Chinese espionage group — active since at least 2009 — that has spent over a decade targeting South Korea, Japan, and Taiwan before expanding east to include Russia and Eastern Europe. The Russia targeting is strategically notable: China publicly aligned with Russia as a "comprehensive strategic partner" while simultaneously running espionage campaigns against Russian government agencies, infrastructure providers, and security firms. The Bisonal RAT used by Tonto Team has been observed exclusively among Chinese APT groups and has been in development for over 15 years, making it one of the more reliable Chinese-exclusive attribution anchors in public threat intelligence.
expand profile
active since~2009 (HeartBeat Campaign 2009–2012; Operation Bitter Biscuit 2017; Russia targeting confirmed 2022; cybersecurity firm targeting 2021–2022)
also known asCactusPete, Bronze Huntley, Earth Akhlut, Karma Panda, HeartBeat, TAG-74, PLA Unit 65017 (assessed)
primary motivationJapan, South Korea, and Russia espionage / government, military, and technology sector intelligence collection
mitre groupG0131
primary targets
South Korea, Japan, Taiwan
Russia (government and infrastructure)
Eastern Europe (from 2020)
Military, energy, finance, healthcare
IT and cybersecurity companies
typical methods
Spearphishing with Royal Road RTF weaponizer — embeds malicious code in RTF files exploiting Microsoft Equation Editor vulnerabilities (CVE-2017-11882, CVE-2018-0802, CVE-2018-0798); Bisonal RAT (custom Chinese-exclusive backdoor in continuous development since ~2009) — Bisonal.DoubleT variant with updated C2 comms; TontoTeam.Downloader (aka QuickMute) used as staging downloader; ShadowPad and Dexbia backdoors; Russian-language lures impersonating government security advisories and warnings; impersonation of legitimate company employees using free email services (GMX Mail) for initial delivery; targeting of cybersecurity firms directly — attempted intrusion against Group-IB twice (2021, 2022); exploit chain triggered on document open without user interaction beyond enabling macros; C2 communications via custom encrypted channels.
view full profile
K3
APT15 / Ke3chang
China — state-sponsored
nation-state
active
One of the longest-running Chinese diplomatic espionage groups — active since at least 2010 and continuously evolving its toolset across three generations of custom backdoors. First publicly identified through Operation Ke3chang in 2014, which compromised European ministries of foreign affairs using Syria crisis lures timed to a G20 summit. The group's Graphican backdoor (2023) uses Microsoft Graph API and OneDrive for C2 — a technique that blends malicious traffic into legitimate cloud service communications. Confirmed active July 2024–March 2025 through PurpleHaze campaign activity targeting 75+ organizations, using ShadowPad and exploiting Ivanti zero-days before public disclosure.
expand profile
active since~2010 (Ke3chang campaign; PurpleHaze activity July 2024–March 2025; 75+ organizations compromised)
also known asKe3chang, Mirage, Vixen Panda, GREF, Nylon Typhoon, NICKEL, Flea, BackdoorDiplomacy, Playful Dragon, RoyalAPT, Bronze Palace
primary motivationEuropean government and diplomatic espionage / foreign ministry targeting / PRC strategic intelligence
mitre groupG0004
primary targets
Ministries of foreign affairs (Europe, Americas)
Embassies and diplomatic missions
Defense contractors / military
NGOs and think tanks (China-focused)
Telecom / IT services / critical infrastructure
typical methods
Low-volume, highly contextualized spearphishing to diplomats, officials, and researchers — themed around government relations, policy, conference invitations; Syria crisis lures used to compromise European MFAs in 2013 (timed to G20 Russia summit); three-generation custom backdoor evolution: BS2005 → Ketrican → Graphican; Graphican (2023): abuses Microsoft Graph API and OneDrive for C2, eliminating hardcoded server addresses and blending into legitimate cloud traffic; RoyalCli and RoyalDNS custom backdoors; MirageFox RAT; ShadowPad modular backdoor (PurpleHaze 2024–2025); exploit of Ivanti CVE-2024-8963 and CVE-2024-8190 zero-days before public disclosure; ORB (Operational Relay Box) network infrastructure used to obscure C2 and raise attribution cost; credential dumping via Mimikatz and custom stealers; post-exploitation persistence via legitimate remote access tools; infrastructure and backdoor sharing observed with other Chinese APT groups.
view full profile
LY
Lyceum / Hexane
Iran — state-linked
nation-state
active
An Iranian espionage group with a focused mandate: telecom carriers and energy sector operators in the Middle East and Africa. The targeting logic is deliberate — compromise an ISP or telecom provider to gain a pivot point into the networks of its government and enterprise clients. The group uses convincing fake job offers (impersonating named HR staff from real companies, sometimes using identities of former employees) to deliver malware via LinkedIn and email. Tool and tactic similarities with OilRig (APT34) are described by ESET as "too numerous and specific" to be coincidental, suggesting resource sharing or common origin within Iran's intelligence apparatus.
expand profile
active since~2017 (Dragos first identified as HEXANE; active through 2021–2022 ISP/telecom campaigns; ongoing)
also known asHexane (Dragos), Siamesekitten (ClearSky), COBALT LYCEUM (Secureworks), Spirlin, Storm-0133, UNC1530 — ESET notes strong tactical overlap with OilRig/APT34
primary motivationEnergy and telecom sector espionage / Middle East strategic intelligence / supply chain pivot access
mitre groupG0077
primary targets
Telecom carriers and ISPs
Oil and gas companies (Middle East)
Israel, Saudi Arabia, Kuwait, Morocco, Tunisia
Ministries of Foreign Affairs
IT companies (supply chain pivot)
typical methods
Initial access via password spraying and brute-force credential attacks; once credentials obtained, internal spearphishing from compromised accounts to HR and IT staff; fake job offer lures on LinkedIn impersonating named HR managers — uses former employees' identities for legitimacy; malicious Excel attachments with embedded DanBot RAT; DanBot delivers Shark and Milan (James) backdoors; Shark (C#/.NET): DNS tunneling or HTTP C2; Milan: 32-bit RAT for data retrieval; Marlin backdoor (2022): uses Microsoft OneDrive API for C2 — same cloud-blending technique as APT15's Graphican; DNS tunneling as primary C2 with HTTP fallback (noted as partially non-functional in some samples, suggesting rapid development); DanBot drops PowerShell-based post-exploitation tools; "security best practice" themed decoy documents to target IT personnel; ISP compromise used as pivot to downstream government and enterprise clients; fake profiles created for impersonated companies with detailed backstory research.
view full profile
MS
Moses Staff
Iran — IRGC-linked
nation-state
active
An Iranian state-linked group operating under a pro-Palestinian hacktivist persona — but assessed by SecureWorks and others as an inauthentic front for IRGC cyber operations. Moses Staff conducts multi-stage attacks: espionage with StrifeWater RAT (which removes itself before the final stage), followed by data exfiltration, then deployment of DCSrv cryptographic wiper disguised as ransomware. Unlike financial ransomware groups, Moses Staff never offers decryption keys — the "ransom" framing exists to obfuscate the state-sponsored nature and inflict maximum disruption. Victims include organizations in Israel, Italy, India, Germany, Chile, Turkey, UAE, and the US.
expand profile
active since~2021 (first spotted October 2021; ongoing — also operates Abraham's Ax persona)
also known asDEV-0500, Storm-0784, Marigold Sandstorm (Microsoft), COBALT SAPLING (SecureWorks), Vengeful Kitten (CrowdStrike)
primary motivationDestructive attacks and data leaks targeting Israel / geopolitical disruption / espionage cover
mitre groupG1009
primary targets
Israel (primary — government, military, private sector)
Italy, India, Germany, UAE
Chile, Turkey, United States
Unit 8200 intelligence community leaks
typical methods
Multi-stage attack chain: StrifeWater RAT (disguised as calc.exe) for initial access and reconnaissance — self-removes before final payload to avoid detection; PyDCrypt (PyInstaller-compiled) distributed across victim network to drop DCSrv; DCSrv: cryptographic wiper using open-source DiskCryptor to encrypt all hard drive volumes — no decryption key ever offered; encryption serves dual purpose: disrupting business operations and covering espionage activity; data exfiltration precedes encryption — stolen data published on dark web leak site; Telegram channel used to publish leaks with inflammatory political messaging; claimed leaks include Israeli military maps, Unit 8200 data, and 3D image maps of Israel; publicly admits to political motivation (unlike other Iranian groups hiding under criminal framing); operates multiple hacktivist personas alongside Moses Staff (Abraham's Ax); victims in 8+ countries despite primary Israel focus.
view full profile
T5
TA577
Eastern Europe — financially motivated
cybercrime
active
One of the most prolific and adaptive initial access brokers in the eCrime ecosystem — informally nicknamed the "letters" affiliate for its use of campaign IDs like AA, BB, and TR. TA577 functioned as one of Qbot's primary distributors for years, then rapidly pivoted through the disruption cycle: DarkGate and IcedID after the August 2023 Qbot takedown, then PikaBot, then Latrodectus in late 2023. In early 2024 the group shifted to NTLM hash theft via weaponized email attachments — a sign of expanding from pure access brokerage into post-exploitation credential staging that feeds directly into Black Basta ransomware operations.
expand profile
active since~2020 (Qbot distribution; ongoing through 2025 with Latrodectus and credential theft pivots)
also known asHive0118 (IBM), Water Curupira (Trend Micro) — Russian-speaking cybercriminals assessed; Black Basta ransomware downstream access relationship
primary motivationFinancial — initial access brokerage / IcedID and Qbot distribution / ransomware precursor access
mitre groupUnassigned
primary targets
Broad enterprise targeting (no sector focus)
North America, Europe, global
Organizations with downstream ransomware value
typical methods
High-volume phishing email campaigns (hundreds to thousands per campaign) — historically macro-laden Office documents, then pivoted to HTML smuggling, ZIP/ISO/OneNote container payloads after macro execution policy changes; email thread hijacking (reply-chain phishing) to add credibility to malicious links; malware payload evolution: Qbot (primary until August 2023 takedown) → DarkGate + IcedID (late 2023) → PikaBot (fall 2023–early 2024) → Latrodectus (November 2023 pilot, later shared with TA578) → NTLM hash theft via coercive attachments (2024 pivot); NTLM hash collection enables lateral movement and domain compromise without deploying malware; Pikabot loader drops Cobalt Strike for ransomware pre-positioning; first distributor of Pikabot malware (March 2023); Latrodectus used in three campaigns November 2023 before reverting to Pikabot; downstream access sold to Black Basta ransomware crew; rapidly retooled after every major infrastructure takedown.
view full profile
L$
Lapsus$ Group
UK / Brazil — loosely organized cybercrime
cybercrime
dormant
A case study in what the Cyber Safety Review Board called "exploiting systemic ecosystem weaknesses" — Lapsus$ breached NVIDIA, Microsoft, Samsung, Okta, Uber, Rockstar Games, and dozens more using almost no custom malware, relying instead on social engineering, MFA fatigue attacks, SIM swapping, and paying insiders for credentials. The group was notably composed of teenagers — its ringleader was 16 at the time of his most prominent attacks and received an indefinite hospital order in December 2023. Largely inactive since September 2022 following arrests, but the tactics Lapsus$ pioneered remain in active use across the eCrime ecosystem and directly influenced groups like Scattered Spider.
expand profile
active since~2021 (peak activity December 2021–September 2022; largely dormant after arrests; Arion Kurtaj sentenced December 2023)
also known asDEV-0537, Strawberry Tempest (Microsoft), SLIPPY SPIDER, UNC3661 — UK/Brazil members, primarily teenagers at time of activity
primary motivationFinancial extortion and notoriety — data theft without ransomware / public leak threats
mitre groupG1004
primary targets
NVIDIA, Microsoft, Samsung, Okta
Uber, Rockstar Games (GTA VI source code)
Vodafone, T-Mobile, Globant
Brazil Ministry of Health (first attack)
Cryptocurrency exchange user accounts
typical methods
Identity-first attack model with minimal custom malware; social engineering helpdesk staff to reset credentials or bypass MFA; MFA fatigue (push bombing) — repeated MFA notifications until target approves out of frustration; SIM swapping to intercept SMS-based MFA codes; recruiting and paying employees, contractors, and call center workers for credentials and MFA approvals — advertised openly on Telegram; session token replay to hijack authenticated cloud sessions; Okta support contractor compromise (January 2022) — gave access to ~366 customer organizations; cloud tenant takeover: creating new global admin accounts, establishing mail flow rules, locking out legitimate admins; joining victim incident response calls ("war rooms") in real time to monitor and disrupt response; Telegram channel used for public breach announcements, stolen data samples, and target polls (50,000+ subscribers); no ransomware deployment — pure data theft and extortion; source code theft from NVIDIA, Microsoft, Samsung; 50 TB deleted from Brazil Ministry of Health; Rockstar Games GTA VI footage leaked September 2022; CSRB report (August 2023) identified group as a systemic warning about identity infrastructure weaknesses.
view full profile
MW
Mango Sandstorm / Mercury
Iran — MOIS-linked
nation-state
active
Iran's MOIS-subordinate espionage group, active since at least 2017 with one of the broadest geographic footprints among Iranian APTs — covering the Middle East, Asia, Africa, Europe, and North America. Known operationally as MuddyWater by most vendors, the group shifted in 2023–2024 from PowerShell-heavy scripts to abusing legitimate remote monitoring and management (RMM) tools as primary C2 channels, making malicious traffic indistinguishable from normal enterprise tooling. In 2023 it collaborated with DEV-1084 on DarkBit pseudo-ransomware attacks that were actually destructive wipers against Azure cloud environments. Confirmed active March 2026 targeting US, Israeli, and Canadian organizations with Dindoor (Deno-runtime backdoor) and Fakeset (Python implant).
expand profile
active since~2017 (CISA attributed to MOIS 2022; confirmed active March 2026 — Dindoor/Fakeset campaign US/Israel/Canada)
also known asMuddyWater, Static Kitten, Seedworm, TEMP.Zagros, Earth Vetala, TA450, Boggy Serpens — assessed MOIS subordinate element confirmed by CISA/FBI/CNMF advisory 2022
primary motivationEspionage and sabotage / government and NGO targeting / MOIS strategic intelligence collection
mitre groupG0069
primary targets
Government and defense (Middle East, NATO)
Telecom, energy, oil and gas
Israel (priority target since 2020)
NGOs / academic / healthcare
US, Canada, Turkey, Gulf states
typical methods
Phase I (2017–2022): PowerShell/VBS-heavy — POWERSTATS, PowGoop, Small Sieve, Canopy/Starwhale, Mori backdoors; Phase II (2023–2024): pivot to abusing legitimate RMM tools (SimpleHelp, ScreenConnect, N-able) as primary C2 — traffic blends with enterprise tooling; BugSleep/MuddyRot backdoors; Phase III (2025–2026): Dindoor (Deno JavaScript runtime for C2 — uncommon LotL technique evading Node.js detection), RustyWater (first Rust-based MuddyWater implant — delivered via ZIP with PDF-icon disguise), Fakeset (Python implant), Phoenix C2 framework; spearphishing at scale (hundreds of recipients) via PDF attachments with embedded links; credential harvesting targeting Brave, Chrome, Edge, Opera; exploitation of Fortinet CVEs (CVE-2024-55591, CVE-2024-23113, CVE-2022-42475) and SolarWinds N-central CVE-2025-9316; 2023 DarkBit collaboration with DEV-1084: pseudo-ransomware masking Azure cloud wiper operations; documented correlation since 2024 between compromised CCTV access and Iranian kinetic missile strike targeting; domestic surveillance mandate confirmed by BaSalam marketplace compromise.
view full profile
EL
Exotic Lily
Eastern Europe — initial access broker
cybercrime
active
Described by Google TAG as "the opportunistic locksmiths of the security world" — Exotic Lily is a full-time initial access broker that distinguished itself by the unusually high level of human engagement involved in its phishing campaigns. Rather than blasting malware attachments at scale, operators build a fabricated business identity (fake LinkedIn profile, AI-generated photo, spoofed company domain), initiate real email correspondence, schedule meetings to discuss business requirements, then deliver malware via a legitimate file-sharing notification email. At peak activity it was sending 5,000+ emails per day to 650 organizations — while apparently maintaining this relationship-building model across all of them.
expand profile
active since~2021 (first spotted September 2021 exploiting CVE-2021-40444; confirmed ongoing through 2022–2023 with Bumblebee)
also known asPROJECTOR LIBRA (CrowdStrike), TA580 — Eastern/Central European working hours; linked to Wizard Spider / FIN12 ransomware ecosystem
primary motivationFinancial — IAB operations providing initial access to Conti and Diavol ransomware crews
mitre groupG1011
primary targets
IT and cybersecurity (early focus)
Healthcare
Broad enterprise (expanded November 2021)
650+ organizations globally at peak
typical methods
Fabricated company identities with fake LinkedIn profiles using AI-generated or stolen employee photos; personal data harvested from RocketReach, CrunchBase, and social media to build convincing spoofed personas; initial email poses as business proposal (software development outsourcing, information security services, partnership inquiry); multi-turn email correspondence builds rapport before delivering payload — unusual level of human interaction for an IAB; payload delivered via legitimate file-sharing service notification email (TransferNow, TransferXL, WeTransfer, OneDrive) so final email originates from the file-sharing service's domain rather than attacker's; early campaigns: CVE-2021-40444 MSHTML zero-day exploiting Office documents; shifted to ISO archives with BazarLoader DLL + LNK shortcuts; then Bumblebee loader (uses WMI to fingerprint victim, exfiltrates JSON to C2, downloads Cobalt Strike); Cobalt Strike used for AD environment mapping — high-value targets receive Conti or Diavol ransomware; operators active Monday–Friday 9AM–5PM Eastern European time; Conti leaks confirmed "spammers" as external contractors supplied with custom crypted malware samples.
view full profile
FT
Flax Typhoon
China — MSS-linked (Taiwan focus)
nation-state
active
A Chinese espionage group with a dual identity: as Flax Typhoon it conducts stealthy LotL-heavy intrusions into Taiwanese government, education, and technology organizations; as the operator of the Raptor Train botnet (linked to front company Integrity Technology Group) it maintained a 260,000-device IoT/SOHO botnet used for espionage relay and global C2 infrastructure. The September 2024 FBI operation that disrupted the botnet provoked a real-time DDoS counterattack from the operators, who attempted to migrate infrastructure before being identified and abandoning the network entirely. Integrity Technology Group was OFAC-sanctioned January 2025.
expand profile
active since~2021 (Raptor Train botnet active mid-2021; botnet disrupted September 2024; ongoing espionage operations)
also known asEthereal Panda (CrowdStrike), RedJuliett, UNC5007, Storm-0919 — linked to Integrity Technology Group (Beijing) sanctioned January 2025
primary motivationTaiwan government and critical infrastructure espionage / long-term persistent access
mitre groupUnassigned
primary targets
Taiwanese government agencies
Education, IT, critical manufacturing (Taiwan)
Southeast Asia, North America, Africa
IoT/SOHO devices globally (botnet targets)
385,000+ US devices in botnet database
typical methods
Minimal-malware LotL approach — exploits known vulnerabilities in public-facing servers for initial access; China Chopper and GodZilla web shells; Windows Remote Management and WMIC for lateral movement; SoftEther VPN renamed to conhost.exe or dllhost.exe — uses VPN-over-HTTPS on TCP 443 to disguise VPN traffic as legitimate HTTPS; credential dumping via Mimikatz and ProcDump targeting LSASS memory and SAM registry; RDP for persistent access; Raptor Train botnet (via Integrity Technology Group front company): 260,000 IoT/SOHO routers, firewalls, NAS devices, and cameras compromised globally; botnet C2 via Tier 1 infected devices (avg 17-day lifespan — no persistence required due to massive pool of vulnerable devices) routing through Tier 2 management servers; Sparrow application for botnet management; MySQL database storing 1.2M+ device records; C2 subdomains under w8510.com; September 2024: FBI operation seized botnet — operators launched DDoS against FBI infrastructure before abandoning; OFAC sanctioned Integrity Technology Group January 3, 2025.
view full profile
SB
Star Blizzard / SEABORGIUM
Russia — FSB Centre 18
nation-state
active
The FSB's credential-theft and influence intelligence unit — dedicated to systematically compromising the personal email accounts of NATO government officials, defense contractors, journalists, NGOs, and think tanks. The group's approach is unusually patient: operators invest extended time building rapport with targets on topics of genuine interest before introducing a phishing link. The EvilGinx reverse-proxy framework steals both credentials and session cookies simultaneously, bypassing 2FA. In October 2024 DOJ and Microsoft jointly seized 100+ of its phishing domains, the largest single disruption of its infrastructure — the group quickly re-established new infrastructure. In 2025 it added LostKeys malware delivered via ClickFix for select high-value targets.
expand profile
active since~2019 (some sources 2015; confirmed FSB Centre 18 attribution December 2023; active through 2025 with LostKeys malware)
also known asSEABORGIUM, Callisto Group, COLDRIVER, TA446, TAG-53, BlueCharlie — FSB Centre 18 confirmed; Ruslan Peretyatko and Andrey Korinets indicted and sanctioned December 2023
primary motivationCredential phishing against NATO governments and NGOs / long-term email account access / influence intelligence
mitre groupG1033
primary targets
UK government, politicians, defense-industrial
US Intelligence Community and contractors
NATO government officials
Think tanks, NGOs, journalists
Ukraine support organizations
typical methods
Extensive OSINT on targets via LinkedIn and social media before making contact; initial approach via targets' personal email addresses (deliberately avoids corporate addresses and enterprise security monitoring); benign first contact on topics of genuine professional interest — extended rapport-building over days or weeks before delivering payload; malicious link embedded in PDF hosted on Google Drive or OneDrive pointing to phishing site; phishing sites spoof Microsoft, Yahoo, and other email providers; EvilGinx reverse-proxy framework steals credentials AND session cookies simultaneously — bypasses 2FA/MFA; post-compromise: inbox analysis, forwarding rules set for persistent email access, lateral phishing to new targets from compromised inbox; server-side scripts block automated security scanning of phishing infrastructure; HubSpot and MailerLite email marketing services used to mask true sending addresses; October 2024: DOJ/Microsoft joint seizure of 100+ domains (41 DOJ + 66 Microsoft); 2025: LostKeys malware added via ClickFix fake-CAPTCHA lure for selective deployment against Western government advisors, military contacts, and Ukraine-connected individuals.
view full profile
WV
TA473 / Winter Vivern
Belarus / Russia — state-aligned (assessed)
nation-state
active
An espionage group aligned with Russian and Belarusian geopolitical objectives, distinguished by a highly methodical approach to webmail exploitation: use Acunetix to scan public-facing email portals for known unpatched CVEs, then engineer bespoke JavaScript payloads customized to each target organization's specific webmail implementation. The group has repeatedly exploited medium-severity vulnerabilities in Zimbra and Roundcube — not sophisticated zero-days but widely unpatched flaws — successfully accessing email accounts across 80+ European government, military, and diplomatic organizations. The October–December 2023 Roundcube XSS campaign notably extended targeting to Iranian embassies in Russia and the Netherlands, suggesting intelligence interests that span the Iran-Russia relationship.
expand profile
active since~2020 (some sources 2021; ongoing through 2024–2025 with expanded targeting and AI-assisted lure generation)
also known asUAC-0114 (CERT-UA), TAG-70 (Insikt Group/Google), Winter Vivern (DomainTools/SentinelOne) — assessed Belarus/Russia aligned; low sophistication, high persistence
primary motivationNATO government webmail targeting / European political and military intelligence / Russia-Ukraine war intelligence collection
mitre groupG1035
primary targets
European government and military webmail
Ukraine, Poland, Georgia (priority targets)
US elected officials and staffers
NATO diplomats and defense contractors
Iran embassies in Russia/Netherlands (2023)
typical methods
Acunetix scanning of public-facing webmail portals to identify unpatched Zimbra and Roundcube instances; CVE-2022-27926 (Zimbra XSS, CVSS 6.1) — unauthenticated JavaScript execution; CVE-2023-5631 (Roundcube XSS) — exploited as zero-day in October 2023 Roundcube campaign hitting 80+ organizations; custom JavaScript payloads engineered per target organization's webmail implementation — CSRF attacks to steal usernames, passwords, and active session/CSRF tokens from cookies; phishing emails sent from compromised WordPress-hosted domains; email from-field spoofed to appear from the target organization or a relevant peer; benign URL from legitimate organization hyperlinked over actor-controlled infrastructure; URI paths encode hashed target identifier and organization name; 2024–2025: multi-layer staging servers, cloud-based email evasion, HTML smuggling, MFA bypass phishing components, AI-assisted multilingual lure generation; also uses Follina (CVE-2022-30190) and PowerShell payloads in phishing campaigns; lateral phishing from compromised accounts to expand within target organizations.
view full profile
SG
SilkBean / GoldenEagle
China — state-suspected (Uyghur targeting)
nation-state
active
A mobile surveillance cluster — not a single group, but four interconnected Android spyware families (SilkBean, DoubleAgent, CarbonSteal, GoldenEagle) discovered by Lookout in 2020 and traceable to at least 2013. All four share C2 infrastructure, signing certificates, and code overlap, pointing to a single state-linked operator. Infrastructure connects to GREF / APT15 desktop activity. The targeting is systematic: apps are trojanized versions of legitimate services used by Uyghur communities (music apps, e-commerce, pharmaceutical guides, keyboards), delivered in 10+ languages across 14+ countries wherever Uyghur diaspora communities exist. As one Lookout researcher put it: "wherever China's Uyghurs are going, however far they go, the malware followed them there."
expand profile
active since~2013–2015 (Lookout publicly disclosed July 2020; new GoldenEagle samples observed into 2020; activity in 14+ countries)
also known asDoubleAgent, CarbonSteal, GoldenEagle (four-family mobile cluster) — infrastructure linked to GREF / APT15 / Ke3chang
primary motivationUyghur and Tibetan community surveillance / diaspora monitoring / domestic and international population control
mitre groupUnassigned
primary targets
Uyghur diaspora (primary — 14+ countries)
Tibetan communities
Muslim communities broadly (GoldenEagle)
Turkey, Kazakhstan, Indonesia, Kuwait, Syria
typical methods
Trojanized Android apps impersonating legitimate Uyghur community services — Sarkuy (music), Tawarim (e-commerce), TIBBIYJAWHAR (pharmaceutical), Uyghur keyboards, third-party app stores (islamapk[.]com, yurdax[.]com); SilkBean: 70 remote commands including call recording, SMS interception, location tracking, file exfiltration, microphone activation, contact harvesting; DoubleAgent: full Android RAT with C2 overlap with SilkBean — latest samples masquerade as third-party app stores; CarbonSteal (500+ samples since 2017): extensive multi-codec audio recording, SMS-controlled operation (allows covert silent call answering for ambient audio surveillance), suspected use in areas with limited mobile data coverage; GoldenEagle: targets Uyghurs and Muslims broadly across multiple languages (Arabic, Turkish, Uzbek, Pashto, Indonesian); all four families linked by shared C2 infrastructure, signing certificates, and code; connected to broader desktop APT infrastructure of GREF/APT15; not distributed via Google Play — spread via phishing and fake third-party app stores; activity surge correlated with China's 2015 National Security and Counterterrorism Law implementation.
view full profile
N4
N4ughtySec
Unknown — pro-Palestine hacktivism
hacktivism
active
A group that emerged under the N4ughtySecTU alias targeting South African financial infrastructure — breaching TransUnion SA in March 2022 and exfiltrating data on 5 million consumers, then demanding $15 million in cryptocurrency. When TransUnion refused to pay on principle, the group released the data and claimed sustained access to credit bureau and government systems. Subsequent operations as N4ughtySec expanded to Experian, XDS, and claims of access to South African Social Security Agency (SASSA) systems. Attribution and geopolitical alignment remain contested — the group has made statements aligned with pro-Palestinian positions while primarily executing financially motivated data extortion campaigns.
expand profile
active since~2022 (N4ughtySecTU TransUnion breach March 2022; N4ughtySecGroup operations 2023 onward)
also known asN4ughtySecTU, N4ughtySecGroup, N4aughtySecGroup — attribution and alignment contested; claimed pro-Palestinian stance alongside financial extortion operations
primary motivationHacktivism — pro-Palestine disruption operations / financial data extortion
mitre groupUnassigned
primary targets
TransUnion South Africa (5M consumer records)
Experian South Africa
XDS credit bureau
SASSA (South African Social Security Agency)
South African banking system (claimed)
typical methods
Data exfiltration from financial and credit bureau systems; ransom demands in cryptocurrency with threatened public release — TransUnion demanded $15M (R224M), Experian and XDS demanded $30M each; data released publicly when ransom refused; claimed pivoting from initial credit bureau access into downstream government systems (SASSA) using stolen data sets and backend access as stepping stones; claimed opening 100,000+ fraudulent bank accounts using compromised identity data; MyBroadband communications used to issue public statements and verify access; group claimed sustained multi-year presence in South African financial infrastructure rather than single-incident access.
view full profile
CA
Cyber Av3ngers
Iran — IRGC-linked
nation-state
active
A textbook example of Iranian "faketivism" — an IRGC-affiliated operation presenting itself as a pro-Palestinian hacktivist group while executing state-directed attacks on industrial control systems. CISA confirmed the November 2023 water facility campaign as IRGC-affiliated, and the Treasury Department sanctioned six IRGC Cyber-Electronic Command officials for directing it. The group's method is blunt: scan Shodan/Censys for internet-exposed Unitronics PLCs using default passwords, gain access via default credentials on TCP port 20256, then deface the HMI with "Down with Israel" messaging and alter or delete ladder logic to disrupt or disable operations. The November 2023 Aliquippa Municipal Water Authority breach shut down a pump serving two Pennsylvania townships.
expand profile
active since~2020 (Israeli railway claims July 2020; US water/wastewater campaign November 2023; October 2024 Israeli water treatment claims)
also known asCyberAveng3rs, Cyber Avengers — IRGC Cyber-Electronic Command (IRGC-CEC); Soldiers of Solomon (associated); six IRGC officials sanctioned by US Treasury December 2023
primary motivationAttacks on Israeli-linked industrial control systems / ICS disruption / critical infrastructure pressure on Israeli allies
mitre groupUnassigned
primary targets
Israeli critical infrastructure (water, energy, shipping)
US water and wastewater (Unitronics PLC operators)
Aliquippa Municipal Water Authority (PA, Nov 2023)
Any "made in Israel" equipment globally
typical methods
Shodan/Censys internet reconnaissance to identify internet-exposed Unitronics Vision Series PLCs; exploitation of default credentials on TCP port 20256 (CVE-2023-6448); brute-force on devices not using default passwords; post-access: deface HMI with political messaging ("You have been hacked. Down with Israel."); erase original ladder logic files; download custom replacement ladder logic; reset PLC software version to older version; rename devices to forestall owner access; disable upload/download functions; change default port numbers — renders PLC potentially inoperable; compromised 75+ Unitronics devices (34+ in US water sector) in November 2023 campaign; October 2024: claimed 10 Israeli water treatment stations via misconfigured Unitronics devices; historical claims (Israeli railway, power stations, gas stations) determined to be mostly fabricated or recycled from Moses Staff leak site; "Crucio" ransomware claimed against webcam servers; assessed same IRGC operational model as Moses Staff/Abraham's Ax personas.
view full profile
T4
TA4903
Unknown — financially motivated
cybercrime
active
A financially motivated BEC actor with a two-stage playbook: first impersonate a US government agency (DOT, USDA, DOL, SBA, HUD, DOC) to steal corporate credentials via fake bid proposal portals, then use those stolen credentials to search compromised inboxes for payment-related threads and conduct invoice fraud or payroll redirect. Proofpoint planted honeypot credentials in one of the spoofed bid portals and confirmed access within six days — the actor immediately searched for "bank information," "payment," and "merchant" keywords, confirming the downstream BEC intent. Metadata in the PDF attachments consistently points to Nigerian origin.
expand profile
active since~2019 (documented campaigns from December 2021; surge in activity mid-2023 through 2024; ongoing)
also known asTA4903 (Proofpoint designation) — PDF metadata author field points to Nigerian origin; purely financially motivated confirmed via honeypot research
primary motivationFinancial — BEC and credential phishing against US government contractors / invoice fraud / payroll redirect
mitre groupUnassigned
primary targets
US government contractors (bid process recipients)
SMBs in construction, manufacturing, energy
Finance, healthcare, food and beverage
US-primary with some global targeting
typical methods
High-volume phishing campaigns (hundreds to tens of thousands of messages) spoofing US federal agencies — DOL (2021, 2024), HUD (2022), DOC (2022), DOT (2022), USDA (2023), SBA; PDF attachments themed as government bid proposals with embedded links or QR codes (QR codes adopted late 2023) leading to O365 credential phishing pages; direct URL or HTML/zipped HTML attachments linking to fake Microsoft O365 login pages; EvilProxy reverse-proxy MFA bypass toolkit used throughout 2023 (dropped in 2024); from mid-2023: pivoted to also spoofing SMBs across multiple sectors — "benign" BEC emails with spoofed sender/reply-to addresses using lookalike domains of likely victim suppliers; BEC lure themes: cyberattack notification urging payment detail updates, invoice/remittance requests; post-compromise: credential use to search inbox for "bank information," "payment," "merchant" keywords; thread hijacking for invoice fraud; payroll redirect; "cyberattack" theme used to pressure financial department staff into updating banking details.
view full profile
F11
FIN11
Russia / Ukraine — TA505-adjacent
cybercrime
active
One of the most volume-driven financially motivated groups in the eCrime ecosystem — notable for sheer operational scale rather than technical sophistication. Mandiant tracks FIN11 as a subset of TA505 activity with distinct post-compromise TTPs; CISA and FBI treat them as identical. FIN11 was central to building Clop ransomware's operational model, providing initial access and distribution infrastructure before transitioning to selling network access to other ransomware operations. The May 2023 MOVEit zero-day exploitation (CVE-2023-34362) remains their highest-profile operation, compromising hundreds of organizations globally including US government agencies, and establishing a pure data-extortion-without-encryption model. In late 2024, Clop/FIN11 repeated the pattern against Cleo file transfer software.
expand profile
active since~2016 (Mandiant tracking); TA505 active since 2014; Clop ransomware deployments 2019–present; MOVEit campaign May 2023; Cleo campaign late 2024; Q1 2025 most prolific ransomware group by disclosed breaches
also known asLace Tempest, GOLD TAHOE, DEV-0950, TA505, UNC902, TEMP.Warlok, Hive0065, Spandex Tempest — Eastern European origin assessed; FBI/CISA treat FIN11 and TA505 as identical
primary motivationFinancial — phishing, POS skimming, ransomware, and data extortion / Clop ransomware primary operator
mitre groupUnassigned
primary targets
Global enterprise (broad — no sector focus)
North America, Europe (primary geographies)
Healthcare, pharma (COVID-era focus)
File transfer platform users (MOVEit, Cleo, GoAnywhere)
typical methods
Historically: high-volume phishing campaigns (millions of messages) delivering Dridex, FlawedAmmyy, ServHelper, SDBbot RAT — used to establish access for downstream ransomware; monetization evolved: POS malware (2018) → ransomware deployment (2019) → hybrid data extortion (2020) → pure data exfiltration without encryption (2023+); current model: zero-day exploitation of managed file transfer platforms (no phishing required); MOVEit campaign (May 2023, CVE-2023-34362): mass exploitation of SQL injection to deploy web shells and exfiltrate files from hundreds of organizations — US government agencies, UK payroll firms, airlines, universities; Cleo file transfer exploitation (late 2024); GoAnywhere MFT zero-day (2023); HTML smuggling and ISO/VHD delivery replacing macro-heavy Office documents; rapidly rotating C2 architecture using compromised or bulletproof servers; transitioned to access brokerage role — selling/transferring network access to other RaaS operations; TrueBot malware (Silence group) used as additional Clop distribution vector; Q1 2025: surpassed LockBit as most prolific ransomware group by disclosed breaches.
view full profile
DP
Dark Pink / Saaiwc Group
Southeast Asia — state-suspected
nation-state
active
A relatively new and previously undocumented state-suspected APT first publicly identified by Group-IB in January 2023, though activity traces back to mid-2021. Dark Pink stands out for deploying an almost entirely custom toolkit — TelePowerBot, KamiKakaBot, Cucky, Ctealer — while most similarly-positioned groups rely heavily on commodity malware. A signature lure technique exploits ASEAN-Europe diplomatic relations: phishing emails disguised as job applications or policy papers ("Concept paper Strategic Dialogue DEU-IDN") to target government and military personnel. Microphone audio capture is an explicit collection objective alongside document and messenger data theft.
expand profile
active since~2021 (first confirmed attack June 2022; 7 confirmed attacks June–December 2022; ongoing — new KamiKakaBot campaigns confirmed February 2023 and through 2024)
also known asSaaiwc Group (Anheng Hunting Labs / Chinese researchers) — origin unattributed; likely APAC state-sponsored based on targeting of military and government bodies
primary motivationMilitary and government espionage / ASEAN focus / document theft and audio surveillance
mitre groupG1080
primary targets
Military organizations (Philippines, Malaysia, Thailand)
Government ministries and agencies (ASEAN)
Vietnam, Cambodia, Indonesia, Brunei
Bosnia and Herzegovina (European outlier)
NGOs, religious organizations, development agencies
typical methods
Spearphishing emails posing as job applicants — operators scan online job vacancy portals and craft unique emails tailored to advertised roles; ISO image attachments containing: signed legitimate executable (older WinWord.exe susceptible to DLL side-loading), malicious DLL (MSVCR100.dll), and XOR-encrypted decoy document; DLL side-loading via Winword.exe for stealthy malware execution; ASEAN-Europe relationship lures ("Concept paper Strategic Dialogue DEU-IDN") to target ASEAN government officials; KamiKakaBot: browser credential/cookie/history theft from Chrome, Edge, Firefox; remote code execution via LOLBIN MsBuild.exe; TelePowerBot: PowerShell-based C2 via Telegram bot for lateral movement and network reconnaissance; Cucky and Ctealer: custom stealers targeting messenger applications; microphone audio capture (PowerSploit/Get-MicrophoneAudio — only non-custom tool); subsequent KamiKakaBot versions (February 2023+) added improved obfuscation to evade anti-malware; CVE-2017-0199 (Microsoft Office template injection) also observed; also exploited ASEAN-EU trade document themes in supply-chain-style lures.
view full profile
GS
GhostSec
Unknown — Anonymous offshoot / cybercrime overlap
hacktivism
active
One of the most documented examples of hacktivist-to-cybercriminal evolution. GhostSec began in January 2015 as an Anonymous offshoot targeting ISIS websites after the Charlie Hebdo attacks — it even passed intelligence on planned terrorist attacks to law enforcement. By 2023 the group had pivoted to launching GhostLocker, a full Ransomware-as-a-Service platform, while simultaneously attacking Israeli infrastructure under pro-Palestinian framing. The group's own admission — "Hacktivism does not pay the bills!" — captures the transition. In May 2024 they announced retirement from cybercrime and transfer of GhostLocker operations to Stormous, though the Five Families alliance and continued infrastructure activity suggest the exit was not clean.
expand profile
active since~2015 (anti-ISIS origin; GhostLocker launched October 2023; claimed exit from cybercrime May 2024; ongoing hacktivist activity)
also known asGhost Security, GhostSecMafia, GSM — Five Families founding member (with ThreatSec, Stormous, Blackforums, SiegedSec); Stormous operates GhostLocker post-May 2024
primary motivationHacktivism + financial — anti-ISIS origin, shifted to pro-Palestine operations and ransomware extortion
mitre groupUnassigned
primary targets
Israel (defense, infrastructure, ICS 2022–2024)
Critical infrastructure (ICS/OT systems)
Government, healthcare, financial (ransomware)
Russia (Gysinoozerskaya hydro plant 2022)
Global — 70+ countries via GhostLocker RaaS
typical methods
Early phase: DDoS and website defacement against ISIS propaganda sites; intelligence collection passed to law enforcement (foreknowledge of 2015 Paris attack patterns); GhostPresser website attack tool and GhostSec Deep Scan; ICS/OT targeting: claimed disruption of Belarusian train RTUs (2023), Israeli water pumps (October 2023); GhostLocker RaaS (launched October 2023): Python-based first version, rebuilt in Golang (GhostLocker 2.0, January 2024) using Fernet/AES-128 encryption; web-based builder allowing affiliates to customize encryption paths, kill processes, disable AV/EDR services, set ransom amounts, configure delays and persistence; GhostLocker files appended with ".ghost" extension; GhostLocker 2.0 cross-platform: Windows, Linux, VMware; STMX_GhostLocker joint RaaS launched with Stormous (early 2024); double extortion — data exfiltration then encryption; subscription-based Telegram premium channel ("GhostSec Mafia Premium") monetizes data leaks and hacking tutorials; GhostLocker source code (v3) transferred to Stormous affiliates May 2024.
view full profile
SS
SiegedSec
USA — hacktivist collective
hacktivism
disbanded
Self-described "gay furry hackers" — a US-based hacktivist collective that spent two years targeting NATO, a major nuclear research lab, right-wing organizations, and anti-LGBTQ+ state governments under explicitly queer political framing. The Idaho National Laboratory breach demanded the facility research "creating IRL catgirls." The Heritage Foundation breach ended with the group publishing leaked chat logs of the foundation's executive director threatening them in colorful terms. SiegedSec disbanded July 11, 2024, citing FBI scrutiny and mental health — days after the Heritage Foundation hack generated international headlines and the leader was reportedly raided by the FBI.
expand profile
active sinceApril 2022 — disbanded July 11, 2024 (multiple interim disbandments used to reduce law enforcement attention; leader "vio" reportedly FBI-raided post-disbandment)
also known asGay Furry Hackers, Sieged Security, GSM — led by "YourAnonWolf" / "vio"; Five Families member until late 2023; allied with GhostSec, KittenSec, ByteMeCrew
primary motivationPolitical hacktivism — anti-government and anti-corporate / LGBTQ+ rights / anti-NATO / anti-right-wing
mitre groupUnassigned
primary targets
NATO (multiple portals, 2023)
Idaho National Laboratory (nuclear research)
Heritage Foundation / Project 2025
US states with anti-trans/anti-abortion legislation
Israel (Bezeq telecom, 2023)
typical methods
Data exfiltration and public leak rather than ransomware — goal is transparency and reputational damage, not financial gain; #OpTransRights (June 2023): US state government data including Fort Worth TX, Nebraska Supreme Court, SC police; NATO portal compromise (twice in 2023): JADL Portal, NATO Lessons Learned Portal, Logistics Network Portal, Communities of Interest Portal, Investment Division Portal, Standardization Office Portal — NATO confirmed and launched investigation; Idaho National Laboratory: Oracle HR system breach, employee PII leaked, ransom note demanded "IRL catgirl research"; Bezeq (Israel): ~50,000 customer records leaked; Heritage Foundation breach (July 2024): 200GB claimed, 2GB released — disputed by Heritage as a public contractor archive rather than a system breach; publication of post-breach chat logs with targets for maximum public pressure; "lulz" attacks interspersed with political operations; recurring pattern of disbanding and reforming to manage law enforcement attention.
view full profile
S18
Storm-1811
Unknown — financially motivated
cybercrime
active
A Black Basta ransomware delivery group notable for a uniquely engineered social engineering chain: first flood the target's inbox with legitimate subscription emails (link listing attack), then call posing as IT support to "help" with the spam problem, then convince the user to open Quick Assist and grant remote access — all before any malware is deployed. The technique bypasses email security entirely, exploits a user who is already stressed and actively seeking help, and abuses a Microsoft-built tool installed by default on every Windows 11 device. Black Basta affiliates had breached 500+ organizations by May 2024, generating at least $100 million in ransom payments.
expand profile
active since~2024 (Microsoft tracking from mid-April 2024; ongoing — confirmed resurgence through late 2024)
also known asStorm-1811 (Microsoft designation) — Black Basta ransomware delivery affiliate; Black Basta is a closed, non-public RaaS operated by small number of trusted actors
primary motivationFinancial — Quick Assist abuse / Black Basta ransomware delivery
mitre groupG1046
primary targets
Manufacturing, construction, food and beverage
Transportation (opportunistic sector targeting)
Healthcare (Black Basta accelerated targeting 2024)
500+ organizations breached by Black Basta 2022–2024
typical methods
Email bombing (link listing): sign up target's email address to hundreds of legitimate subscription services to flood inbox with real mail — creates a pretext for the next step; vishing call impersonating Microsoft technical support or company IT helpdesk offering to fix the spam problem; victim instructed to press CTRL+Windows+Q (Quick Assist shortcut) and enter a security code; after code entry: victim receives "allow screen sharing" prompt — if approved, attacker has full device control; scripted cURL command downloads batch files or ZIP files containing QakBot or initial payloads; ScreenConnect and NetSupport Manager RMM tools deployed for persistence; Cobalt Strike Beacon for post-exploitation; PowerShell batch script harvests credentials under false "update requires login" pretext — credentials exfiltrated via SCP; domain enumeration, lateral movement through the network; PsExec used to deploy Black Basta ransomware across the network; late May 2024: Microsoft Teams used as additional contact vector — fake tenant accounts named "Help Desk", "Help Desk IT", "Help Desk Support", "IT Support"; OpenSSH tunneling for SSH persistence.
view full profile
ST
Stormous Ransomware Group
Arabic-speaking — pro-Russia alignment
ransomware
active
An Arabic-speaking ransomware and hacktivism group active since 2021, known for politically aligning with Russia during the Ukraine conflict and conducting joint operations with GhostSec through the Five Families collective. Stormous draws skepticism from researchers for frequently claiming attacks without producing verifiable evidence — sometimes sharing already-publicly-available data as "proof." The group's credibility rose considerably after the March 2024 STMX_GhostLocker RaaS launch with GhostSec, following which Stormous absorbed full GhostLocker operations when GhostSec exited cybercrime in May 2024. The GhostLocker C2 server has been identified at an IP address located in Moscow.
expand profile
active since~2021 (reduced activity mid-2022; resurgence 2023; STMX_GhostLocker launched February 2024; sole GhostLocker operator from May 2024; French government credential leak May 2025)
also known asStormousX — Five Families founding member (with GhostSec, ThreatSec, Blackforums, SiegedSec); C2 infrastructure linked to Moscow IP address 94[.]103[.]91[.]246
primary motivationFinancial ransomware / hacktivism — pro-Russia and pro-Palestine political alignment
mitre groupUnassigned
primary targets
Cuba, Argentina, Israel, India, Brazil, Qatar
China, Poland, Uzbekistan, Morocco, Vietnam
Technology, education, healthcare, government
Transportation, energy, telecom, real estate
France (government credential leak May 2025)
typical methods
Double extortion ransomware — data exfiltration then encryption; StormousX ransomware (original); STMX_GhostLocker RaaS (from February 2024): joint platform with GhostSec offering paid affiliate tier, free tier, and PYV (publish/sell data only) tier for non-member affiliates; StormCry (Python-to-EXE): AES-256 + RSA wrapper, adds .stormous extension; GhostLocker 2.0 (Golang): AES-128/Fernet encryption, appends .ghost extension; TOR-hosted blog dashboard tracks victim count and disclosed ransom amounts — highest reported ransom $500,000; persistence via Scheduled Tasks, Run key, rogue Windows services, or "stormous.php" web shell used as both defacer and on-demand encryptor; UAC bypass for privilege escalation; Cobalt Strike beacons and PowerShell enumeration for lateral movement via SMB/RDP; cloud and partner API pivoting once domain-level control achieved; heavy obfuscation, packed binaries, renamed system tools, shadow-copy wipes; HTTPS exfiltration with cloud storage drops to blend traffic; HyperGuest hotel-booking API attack (2025): exfiltrated 30,000+ plaintext card records via trusted-relationship entry rather than exploit; May 2025: French government agency credential dump (~70,000 MD5-hashed credentials from AFD, ARS Île-de-France, Cour des Comptes).
view full profile
IN
Indra
Unknown — anti-Iranian regime
hacktivism
active
The predecessor persona to Predatory Sparrow — an anti-Iranian regime hacktivist group that built the operational playbook of wiper malware against Iranian critical infrastructure, beginning with Syrian airline and company targets in 2019–2020 before pivoting to Iran itself. The July 2021 Iranian railway attack displayed train delay messages directing furious passengers to call Ayatollah Khamenei's office directly — the phone number became a running signature across subsequent attacks. Check Point's analysis linked the railway wiper tooling back to Indra's Syria-era operations, effectively deanonymizing the group via its own reused malware. Predatory Sparrow, which later claimed the steel plant and gas station campaigns, is assessed as an evolution or successor of Indra.
expand profile
active since~2019 (Syria operations 2019–2020; Iranian railway July 2021; Iranian fuel distribution October 2021; active as Predatory Sparrow persona from 2021 onward)
also known asPredecessor to Predatory Sparrow / Gonjeshke Darande — wiper malware families: Meteor, Stardust, Comet (three versions); Chaplin (post-rail variant); MeteorExpress (SentinelOne designation); linked aliases include Edalat Ali
primary motivationDisruption of Iranian government and regime-linked infrastructure / anti-regime hacktivism / psychological operations
mitre groupUnassigned
primary targets
Iranian railway and Ministry of Roads (July 2021)
Iranian fuel distribution network (October 2021)
Cham Wings Airlines, Syria (2019–2020)
Syrian companies (multiple, 2019–2020)
typical methods
Custom wiper malware with three confirmed versions — Meteor, Stardust, Comet — each tailored via an encrypted configuration file (msconf.conf) passed as command-line argument, allowing per-victim customization; wiper deploys via scheduled task (mstask) set to fire at 23:55:00; execution flow: msrun.bat moves wiper components to C:\temp, creates scheduled task, unleashes msapp.exe wiper that locks screen and wipes disk contents; Chaplin variant (steel plant attacks): locked machines and displayed past hack history with instructions to call Khamenei's office at 64411 — a recurring satirical signature; July 2021 railway attack: hijacked station departure boards nationwide to display "long delays due to cyberattack — call 64411"; October 2021 fuel subsidy attack: disabled government-issued payment cards on gas pump systems causing nationwide fuel purchase disruption; tools described as "relatively low quality" by Check Point despite successful complex operations — suggests possible insider access or collaboration; Syrian-era operations used social media accounts to claim responsibility directly (facilitating later attribution); Predatory Sparrow / Gonjeshke Darande adopted same operational pattern with escalated destructive capability.
view full profile
BE
APT-C-36 / Blind Eagle
Colombia (suspected) — Latin America espionage
nation-state
active
The most active and persistent APT threat actor focused exclusively on Latin America — hyper-targeted at Colombia's government, judiciary, financial sector, and critical infrastructure, with secondary targeting in Ecuador, Chile, and Panama. Blind Eagle's campaigns are operationally notable for their rapid exploitation windows: the group deployed a CVE-2024-43451 variant just six days after Microsoft released the patch, affecting both patched and unpatched systems. A December 2024 campaign infected over 1,600 victims in a single day — high by any standard, exceptional for an APT with deliberately narrow geographic focus. In February 2025 the group accidentally exposed an HTML file containing 8,075 stolen Colombian credential records including ATM PINs.
expand profile
active since~2018 (Check Point / Kaspersky tracking; notable campaigns 2023–2025; PARAISO campaign December 2024 ~9,000 infections; ongoing 2025)
also known asAguilaCiega, APT-Q-98 — suspected South American origin (possibly Colombian); dual motivation: espionage and financially motivated cybercrime
primary motivationEspionage and financial crime — Colombian and Latin American government / financial sector targeting
mitre groupUnassigned
primary targets
Colombian government, judiciary, military
Colombian tax authority (DIAN) impersonation lures
Colombian banks and financial institutions
Ecuador, Chile, Panama, Spain (secondary)
Health, education, law enforcement (Colombia)
typical methods
Phishing primary — spearphishing for espionage, broader phishing for financial campaigns; email lures impersonate Colombian government agencies (DIAN, Ministry of Foreign Affairs, Attorney General's Office) and financial institutions; PDF or DOCX attachments with embedded redirect links to malicious domains; BCC field used to evade spam filters; CVE-2024-43451 variant (November 2024): malicious .url files trigger WebDAV request via right-click, delete, or drag — notifies attacker of file download even before execution; payload delivery via legitimate platforms: Google Drive, Dropbox, GitHub, Bitbucket (expanded 2024–2025); HeartCrypt packer-as-a-service to protect .NET RAT payloads (PureCrypter variant); commodity RATs as final payload: AsyncRAT, NjRAT, QuasarRAT, LimeRAT, Remcos RAT, BitRAT — chosen per campaign objective; Remcos RAT used in PARAISO campaign (December 2024, ~9,000 infections); DLL sideloading technique (June 2024) via ZIP file containing executable and malicious DLLs; Dynamic DNS (DuckDNS) for C2 infrastructure — high IP rotation; Quasar RAT modified as banking Trojan to intercept Colombian banking credentials from browser; artifacts in Portuguese increasingly observed (2024), suggesting Brazilian infrastructure or personnel involvement; 2025: PowerShell loaders and encrypted C2 channels in Colombian ministry campaigns.
view full profile
CT
Cinnamon Tempest
China — state-suspected espionage
nation-state
active
A China-based threat group that uses ransomware as a distraction from what researchers assess is the real objective: intellectual property theft and espionage. The group cycled through six distinct ransomware brands in under a year (LockFile → Atom Silo → Rook → Night Sky → Pandora → LockBit 2.0), with each variant deployed against a small number of victims then abandoned — an operational pattern inconsistent with financially motivated ransomware groups, which typically sustain a single brand to maximize affiliate recruitment and victim trust. Each rebrand resets payload-based detection and makes attribution harder across incidents. Unusually, Cinnamon Tempest does not use affiliates and operates the entire attack chain independently.
expand profile
active since~2021 (LockFile August 2021; six ransomware variants deployed through 2022; Cheerscrypt Linux-ESXi ransomware 2022; ongoing)
also known asBRONZE STARLIGHT, DEV-0401, Emperor Dragonfly, SLIME34 — China state-suspected; assessed likely linked to Chinese government-sponsored groups based on malware overlaps
primary motivationEspionage / IP theft — ransomware used as cover and distraction for underlying intelligence collection
mitre groupG1021
primary targets
Pharmaceutical, defense, aerospace (IP-rich)
Government and critical infrastructure
Media, manufacturing (varied by campaign)
ESXi VMware environments (Cheerscrypt)
typical methods
Full attack lifecycle operated independently — no affiliates, no RaaS model; Log4Shell exploitation (CVE-2021-44228) used for initial access in multiple campaigns; HUI Loader (custom malware loader associated with Chinese APT groups, also used by APT10/menuPass) used to load Cobalt Strike and ShadowPad backdoor — the ShadowPad link is a strong indicator of Chinese state nexus; six rapid ransomware brand rotations in under a year: LockFile (August 2021), Atom Silo (October 2021), Rook (November 2021), Night Sky (December 2021), Pandora (February 2022), LockBit 2.0 (April 2022); Rook, Night Sky, and Pandora all derived from leaked Babuk source code (leaked September 2021); LockFile and Atom Silo share code similarities; Cheerscrypt (2022): Linux-based ESXi ransomware targeting VMware environments derived from Babuk's ESXi variant; rebrand pattern: each variant deployed against small victim set then permanently abandoned — "in each case, the ransomware targets a small number of victims over a relatively brief period before it ceases operations, apparently permanently" (Secureworks); ransomware deployment timed to obscure post-intrusion espionage activity and complicate attribution to Chinese state actors.
view full profile
SC
SandCat
Uzbekistan — State Security Service (SSS/NSS)
nation-state
active
An Uzbek state intelligence operation — attributed to Uzbekistan's State Security Service — notable less for its capabilities than for its catastrophic operational security failures, which led Kaspersky researchers to discover four separate Windows zero-day exploits in under four months simply by monitoring the group. SandCat's developers installed Kaspersky antivirus with telemetry enabled on their own malware development machines, causing new malicious code to be automatically uploaded to Kaspersky for analysis before it was ever deployed. They also embedded a screenshot of a developer's workstation in a test file, exposing their own attack platform in development. The group targets journalists, human rights activists, and dissidents domestically and in neighboring Central Asian states.
expand profile
active since~2018 (Kaspersky discovery October 2018; Lookout BoneSpy tracking from 2021; PlainGnome Android spyware first observed January 2024; ongoing)
also known asUzbekistan SSS/NSS cyber unit — clients of NSO Group, Candiru, Hacking Team (Italy), Verint, Nice Systems; registered C2 domain using name of a military unit tied to the SSS
primary motivationDomestic and regional surveillance — journalists, dissidents, human rights defenders, neighboring governments
mitre groupUnassigned
primary targets
Journalists and dissidents (Uzbekistan domestic)
Human rights defenders in the region
Kazakhstan, Tajikistan, Kyrgyzstan
Academic and government organizations (neighboring states)
typical methods
Early operations: Chainshot malware delivered via purchased zero-day exploits (four separate Windows zero-days identified by Kaspersky within four months by monitoring the group alone); exploit acquisition from commercial vendors — NSO Group (mobile), Candiru (full-service platform), Hacking Team (leaked emails confirm SSS as client); BoneSpy Android spyware (derived from open-source Russian DroidWatcher 2013–2014): collects SMS, call logs, phone call audio, camera photos, device location, contact lists, trojanized Telegram app; PlainGnome (2024): Android dropper that installs a separate surveillance payload stored within the dropper package; targets Russian-speaking victims in Uzbekistan, Kazakhstan, Tajikistan, Kyrgyzstan; XMPP-based C2 via Rooster client; in-house malware development began after vendor exposure — trojanized Telegram desktop client and password stealer developed; OPSEC failures: antivirus telemetry on development machines (new malware automatically sent to Kaspersky pre-deployment), screenshot of developer workstation embedded in test document, C2 domain registered using military unit name linked directly to SSS, small consistent infrastructure easily tracked across years.
view full profile
CB
Cadet Blizzard
Russia — GRU Unit 29155
nation-state
active
The GRU unit behind WhisperGate — the destructive wiper that preceded Russia's full-scale invasion of Ukraine by one month. Cadet Blizzard deployed WhisperGate against Ukrainian government agencies on January 13, 2022, a month before Russian ground forces crossed the border, framing the malware as ransomware while deliberately omitting any recovery mechanism. Microsoft distinguishes Cadet Blizzard from the more sophisticated Seashell Blizzard (Sandworm) and Forest Blizzard (APT28) — the group operates with lower discipline and achieves comparatively modest impact, yet remains dangerous for its willingness to execute destructive attacks with little apparent operational restraint. The unit is linked to GRU Unit 29155, historically associated with assassination and sabotage operations abroad.
expand profile
active since~2020 (WhisperGate deployment January 13, 2022; peak activity January–June 2022; resumed January 2023; GRU cyber unit established ~2012 per leaked server logs May 2025)
also known asDEV-0586, Ember Bear (CrowdStrike) — GRU Unit 29155; distinct from Forest Blizzard (APT28) and Seashell Blizzard (Sandworm); Amin Stigal (22 y/o Russian civilian) indicted for WhisperGate role; US DOJ $10M reward issued
primary motivationDestruction and disruption / Ukraine pre-invasion preparation / GRU hybrid warfare support
mitre groupG1003
primary targets
Ukrainian government agencies and IT providers
NATO member states supporting Ukraine
European government and critical infrastructure
Latin American organizations (secondary)
typical methods
WhisperGate destructive wiper (January 2022): two-stage malware masquerading as ransomware — Stage 1 overwrites MBR with ransom note displayed on boot; Stage 2 downloaded from Discord CDN, corrupts files by overwriting with fixed 1MB byte patterns regardless of extension; no decryption key exists — destruction is the sole purpose; Bitcoin wallet address and Tox ID contact specified in ransom note (no real payment mechanism); Ukrainian, Russian, and Polish-language false-flag messaging on defaced websites implying Polish hackers; website defacements of Ukrainian government institutions concurrent with WhisperGate; "Free Civilian" hack-and-leak forum on Telegram and Tor — used to publish exfiltrated data for information operations; backdoors planted months before active attack stage (government website attack February 2023 used backdoors installed in prior months); data exfiltration before destructive payload execution; targets government and IT providers primarily in Ukraine; expanded operations to EU, Central Asia, Latin America; at least one Russian private-sector organization assessed to have provided material operational support including during WhisperGate; lower operational security than peer GRU groups; acts in haphazard fashion compared to Seashell Blizzard or Forest Blizzard.
view full profile
FB
TA422 / Fighting Ursa
Russia — GRU Unit 26165
nation-state
active
One of the most extensively documented nation-state threat actors in existence — GRU Unit 26165, known to the public primarily as APT28 or Fancy Bear. Active since at least 2004, the group has executed some of the most consequential cyber operations in the history of state-sponsored hacking: the 2016 US DNC breach and election interference, WADA athlete medical data theft, interference in French and German elections, and sustained Ukraine-focused espionage and disruption throughout the ongoing conflict. Recent operations demonstrate continued technical evolution — a 2025 car-for-sale diplomatic lure campaign, Operation RoundPress exploiting webmail XSS zero-days, BEARDSHELL/COVENANT cloud-based surveillance implants against Ukrainian military, and credential harvesting targeting Western logistics companies supplying Ukraine.
expand profile
active since~2004 (documented operations 2008 Georgia war onward; 2016 US election interference; active Ukraine-focused campaigns through 2025)
also known asAPT28, Fancy Bear, Sofacy, Sednit, Pawn Storm, Forest Blizzard, STRONTIUM, FROZENLAKE, Iron Twilight, BlueDelta, ITG05, Blue Athena, UAC-0028 — GRU Unit 26165 indicted by US DOJ 2018 for 2014–2018 operations
primary motivationEspionage / influence operations / disruption — aligned to Russian military and foreign policy objectives
mitre groupG0007
primary targets
Ukrainian government, military, defense sector
NATO member states and European governments
Western logistics companies supporting Ukraine
Political organizations, elections (US, France, Germany)
Defense industrial base, aerospace, energy
typical methods
Spearphishing with weaponized Office documents and geopolitical lures (car-for-sale diplomatic lures targeting diplomats, Israel-Hamas war decoys, logistics/defense industry documents); CVE-2023-23397 (Microsoft Outlook NTLM hash theft — zero-click, triggers on email receipt); Operation RoundPress (2023–2025): XSS vulnerabilities in Roundcube, Horde, MDaemon (CVE-2024-11182 zero-day), Zimbra to inject SpyPress JavaScript in webmail sessions — steals credentials and harvests emails; GooseEgg (CVE-2022-38028 Windows Print Spooler) for post-compromise privilege escalation; HeadLace backdoor (2024): distributed via Webhook.site and legitimate free services to target diplomats; BEARDSHELL and COVENANT (April 2024+): cloud-based C2 via Koofr storage for persistent surveillance of Ukrainian military — 42+ compromised hosts identified; SLIMAGENT keylogger/screenshot tool (June 2025 public disclosure); UKR[.]net credential harvesting via Mocky-hosted phishing pages (June 2024–April 2025); MASEPIE, OCEANMAP, STEELHOOK implants targeting Ukrainian and Polish government entities; password spraying and brute force at scale via Tor-routed infrastructure; WinRAR vulnerability (CVE-2023-38831) exploitation in targeting chain; Nearest Neighbor Attack (2024): compromised nearby Wi-Fi networks to pivot onto target networks; internet-connected camera monitoring near border crossings and transport hubs to track Ukraine aid logistics (May 2025 multi-agency advisory).
view full profile
LC
TA413 / Lucky Cat
China — CCP-aligned Tibetan diaspora surveillance
nation-state
active
A Chinese state-aligned APT group with a singular decade-long focus: surveillance of the global Tibetan diaspora. TA413's operations impersonate the Bureau of His Holiness the Dalai Lama and Tibetan civil society organizations to deliver spyware into communities where targets already implicitly trust Dalai Lama office communications. A notable operational characteristic: unlike many APT groups, public disclosure of TA413's campaigns, tools, and infrastructure has not led to significant operational changes — the group continues using the same sender Gmail accounts and social engineering templates for years after exposure. The 2021 FriarFox campaign delivered near-total access to targets' Gmail accounts via a trojanized browser extension disguised as Adobe Flash.
expand profile
active since~2011 (Lucky Cat campaign documented by Trend Micro 2012; Proofpoint TA413 tracking from 2020; FriarFox campaign 2021; Royal Road/Follina campaigns 2022; ongoing)
also known asLuckyCat (Android malware campaign name), ExileRAT campaigns — distinct from but operationally similar to EvilBamboo (POISON CARP), Evasive Panda, and TAG-112 which also target Tibetan communities
primary motivationCivil dissident surveillance / Tibetan diaspora monitoring / Chinese Communist Party strategic intelligence interests
mitre groupG0062
primary targets
Tibetan diaspora organizations globally
Central Tibetan Administration (government-in-exile)
Tibetan Women's Association, Tibetan Youth Congress
Tibetan media organizations
European entities (COVID-era brief pivot 2020)
typical methods
Spearphishing impersonating the Bureau of His Holiness the Dalai Lama (known TA413 Gmail account active for years, impersonates the Bureau directly), Tibetan Women's Association, Tibetan National Congress, Tibet Times; FriarFox (2021): malicious Firefox browser extension disguised as "Flash update components" — based on modified open-source Gmail Notifier — delivered via fake Adobe Flash Player update page; grants near-total Gmail access: search, read, delete, forward, archive, label, send email, modify privacy settings, access browser data for all websites; contacts C2 to retrieve Scanbox; Scanbox (since 2014, shared across Chinese APTs): JavaScript/PHP reconnaissance framework, file-less keylogging and user profiling; Sepulcher malware: delivered via Royal Road RTF weaponizer exploiting Microsoft Equation Editor (CVE-2017-11882, CVE-2018-0798, CVE-2018-0802); COVID-19 themed lures in early 2020 for brief European targeting; Follina (CVE-2022-30190) delivery in May 2022 via Tibet-themed photography grant phishing email; domain registrations consistently use registrant organization "asfasf" (keyboard walk of left hand home keys) and GoDaddy registrar; domains spoof Tibetan NGOs and media; hosting via Forewin Telecom, Choopa/Vultr, Linode; operational continuity despite repeated public disclosure — same infrastructure, same Gmail accounts, same social engineering templates reused across years.
view full profile
LM
Leafminer
Iran — state-suspected espionage
nation-state
active
An Iranian-attributed espionage group documented by Symantec in 2018, notable for the extraordinary scale of its targeting ambitions versus its modest technical capabilities. While peer APT groups typically focus on narrow, high-value target sets, Leafminer had an identified list of over 800 organizations across the Middle East spanning government, financial, energy, and petrochemical sectors. The group's poor operational security led to its full exposure — a staging server was left publicly accessible, revealing the group's entire toolkit, a 809-entry Farsi-language target list, and log files from active scans and post-compromise operations. Post-2018 attributed activity is limited in public reporting, suggesting the group may have been absorbed into broader Iranian APT infrastructure or significantly modified its tradecraft.
expand profile
active since~2017 (Symantec publicly documented July 2018; malware detected on 44 systems across Saudi Arabia, Lebanon, Israel, Kuwait and others; limited post-2018 public attribution)
also known asRaspite (Dragos designation) — Iranian state-suspected; staging server linked to Iranian hacking forum Ashiyane and "MagicCoder" handle associated with Sun Army defacement group
primary motivationEspionage — email data, credential theft, database access / Middle East government and energy sector targeting
mitre groupG0077
primary targets
Saudi Arabia, UAE, Qatar, Kuwait, Bahrain
Egypt, Israel, Afghanistan
Government, financial, energy, petrochemical
Shipping, transportation, utilities (secondary)
typical methods
Three primary initial access vectors: (1) Watering hole attacks — compromised web servers inject JavaScript to harvest SMB credential hashes for offline brute force (technique borrowed from Dragonfly APT); (2) Vulnerability scanning and exploitation — 809-target Farsi-language list organized by country and industry; Heartbleed (CVE-2014-0160) scanning; EternalBlue via NSA Shadow Brokers Fuzzbunch framework; (3) Dictionary/brute-force attacks against exposed network service authentication; custom malware: Sorgu (remote access backdoor), Imecab (persistent access Trojan with hardcoded password); modified Mimikatz deployed via Process Doppelgänging (technique disclosed at Black Hat Europe 2017 — group actively tracks offensive security research); Backdoor.Sorgu provides remote access; Trojan.Imecab establishes persistent account; staged toolkit hosted on compromised server (112 files including malware, PoC exploits, scan logs) publicly exposed via PhpSpy webshell left accessible; MagicCoder-linked web shell references magiccoder.ir domain connected to Iranian hacking communities; targets primarily email data, files, and database credentials; also deployed Inception Framework (NSA Shadow Brokers leak) with EternalBlue payloads for SMB exploitation.
view full profile
TA
TA866 / Screentime Group
Russia (suspected) — financially motivated / espionage overlap
apt
active
Notable for a human-in-the-loop reconnaissance model that sets it apart from most financially motivated threat actors: after gaining initial access, the group deploys Screenshotter to take periodic JPG screenshots of the victim's desktop and manually reviews them before deciding whether the target is worth pursuing further. Only after human review does the group proceed to credential theft, Active Directory profiling, or full post-exploitation. This manual triage approach suggests either volume-based targeting where most victims are discarded, or selective high-value targeting where human judgment supplements automated access. The group overlaps significantly with Asylum Ambuscade, a threat actor documented to engage in both cybercrime and state-sponsored espionage operations, blurring motivation classification.
expand profile
active since~2019 (AHK Bot precursor activity; Screentime campaign October 2022–present; January 2024 invoice-themed campaign blocked by Proofpoint)
also known asTA866 (Proofpoint designation — note: spreadsheet listed as TA886, transposed digits); Screentime campaign name; overlaps with Asylum Ambuscade (ESET); Russian variable names and UTC+2/+3 timezone activity pattern suggest Eastern European origin
primary motivationFinancial and possible espionage — manual victim triage distinguishes high-value targets for full exploitation
mitre groupUnassigned
primary targets
US organizations (primary — all industries)
German organizations (secondary)
Financial sector individuals (credential focus)
1,000+ organizations targeted in January 2023 campaign
typical methods
Phishing via TA571 spam distribution service (high-volume delivery partner); initial lures: Microsoft Publisher (.pub) files with malicious macros (2022), then URLs (late 2022), then PDFs with OneDrive links containing malicious URLs (2024); 404 TDS (Traffic Distribution System) filters victims before delivering payload; WasabiSeed (Visual Basic dropper): establishes persistence, continuously loops to download next-stage; Screenshotter: custom malware takes JPG screenshots of victim desktop at regular intervals, POST to hardcoded C2 IP — enables manual human review of victim environment; manual review stage: attackers decide whether to escalate based on screenshots; if valuable: domain profiler script exfiltrates Active Directory domain details to C2; AHK Bot loader: injects fileless Rhadamanthys Stealer into memory for credential and crypto wallet theft; Rhadamanthys: commodity infostealer for credentials, browser data, crypto wallets; operator active hours 2am–2pm EST suggesting UTC+2/+3 timezone; Russian-language variable names and comments in malware code; campaigns scale: thousands to tens of thousands of emails per campaign, two to four times per week.
view full profile
EL
Earth Longzhi
China — APT41 subgroup
nation-state
active
An APT41 subgroup first documented by Trend Micro in November 2022, with operations traceable to 2020. Earth Longzhi is an Asia-Pacific-focused espionage actor targeting sectors with direct relevance to national security and regional economies — defense, aviation, government, healthcare, banking, and urban development. The group is technically distinguished by its custom Cobalt Strike loader ecosystem (CroxLoader, BigpipeLoader, OutLoader) and its evolution of security evasion techniques: from BYOVD attacks (vulnerable driver zamguard.sys) to a novel method called "stack rumbling" — abusing Image File Execution Options to crash security products rather than terminate them, avoiding process-kill detection.
expand profile
active since~2020 (Campaign 1: 2020–2021 Taiwan government/health/banking; Campaign 2: 2021–2022 defense/aviation/insurance; Campaign 3: 2023 Philippines/Thailand/Taiwan/Fiji; ongoing)
also known asAPT41 subgroup — infrastructure and tooling overlaps with Earth Baku, SparklingGoblin, GroupCC; Trend Micro tracking designation
primary motivationEspionage — Asia-Pacific national security and economic intelligence targets
mitre groupG1017
primary targets
Taiwan (government, banking, defense, aviation)
Philippines, Thailand, Malaysia, Indonesia
Ukraine (Campaign 2 — defense/aviation)
Pakistan, China (domestic banking sector)
Fiji (new 2023 — government, manufacturing)
typical methods
Initial access via spearphishing (Campaigns 1–2) or exploitation of public-facing IIS and Microsoft Exchange servers (Campaign 3); Behinder web shell deployed on compromised servers for persistent access; custom Cobalt Strike loaders: CroxLoader (disguised as MpClient.dll — loaded by Windows Defender binaries MpDlpCmd.exe and MpCmdRun.exe via DLL sideloading), BigpipeLoader, OutLoader — each variant uses different decryption algorithm; SPHijacker security product disabler: uses two approaches — (1) BYOVD via vulnerable Zemana driver zamguard64.sys (CVE-2018-5713) to terminate security processes; (2) "stack rumbling" — novel DoS technique abusing undocumented IFEO (Image File Execution Options) Minimum Stack Commit Value to crash security products without making typical process-kill API calls, evading detection; privilege escalation via dwm.exe (UAC bypass via COM object registering payload as Scheduled Task at highest privilege); all-in-one post-exploitation toolkit bundles multiple tools into a single executable; RPC-based driver installation (avoids standard Windows API monitoring); decoy documents in Vietnamese and Indonesian found in 2023 campaign samples suggest Vietnam and Indonesia as next target countries.
view full profile
NS
TA544 / Narwhal Spider
Unknown — Italy and Japan specialist
cybercrime
active
A financially motivated cybercriminal group with an unusually deep specialization in Italian targets — Ursnif (Gozi) banking trojan campaigns targeting Italian organizations have been TA544's dominant activity since at least 2017, with 2021 alone seeing nearly half a million malicious messages targeting Italy. The group developed WikiLoader, a heavily obfuscated downloader first detected December 2022, then rented it to other cybercrime groups — marking a pivot from pure end-user targeting to malware-as-a-service provision. By late 2023, TA544 began expanding beyond Italy toward the US, Canada, and broader Europe, using AI-assisted translation to craft convincing multilingual lures posing as law firms.
expand profile
active since~2017 (Proofpoint first tracking February 2017; Panda Banker campaigns Italy; WikiLoader developed 2022; US/Canada expansion detected 2024)
also known asNarwhal Spider (CrowdStrike), Bamboo Spider, Storm-0302, Zeus Panda — TA544 Ursnif affiliate ID 1000 and 4779 (Proofpoint tracking IDs); URLZone also distributed
primary motivationFinancial — banking credential theft, web injection campaigns, WikiLoader MaaS provision
mitre groupUnassigned
primary targets
Italy (primary — banking, retail, energy sector users)
Japan (secondary — Ursnif + URLZone campaigns)
US, Canada, Europe (expanding 2023–2024)
IT, technology, manufacturing verticals
typical methods
High-volume phishing (hundreds of thousands to millions of messages per campaign): Italian-language lures impersonating courier services (BRT), energy companies, tax authority (Agenzia delle Entrate), and law firms; malicious Microsoft Office attachments (XLS with VBA macros, Excel 4/XLM macros written in Italian) or PDF/OneNote files with embedded URLs; Ursnif (Gozi/ISFB) banking trojan: web injections, VNC connections, proxy-based credential theft targeting UniCredit, ING, BNL, Banca Sella, eBay, PayPal and dozens of Italian financial/retail portals; geofencing C2: server-side IP check redirects non-Italian IPs to adult website instead of delivering payload; steganography: pop culture reference images embedded in documents conceal obfuscated PowerShell commands that download Ursnif; WikiLoader (developed by TA544, first detected December 27, 2022): heavily obfuscated downloader with anti-analysis and sandbox evasion; makes Wikipedia request and checks for string "The Free" before proceeding; retrieves shellcode payload hosted on Discord; actively rented to other threat actors including TA551; WikiLoader → Ursnif as final payload; Windows SmartScreen CVE exploitation (2024 March campaign); AI-translated multilingual lures for US/Canada/Europe expansion (2024); lure themes: fake legal invoices ("Invoice_[number]_from_[law firm name].pdf").
view full profile
T57
TA578
Unknown — initial access broker
cybercrime
active
A financially motivated initial access broker best known as the primary distributor of Latrodectus — a sophisticated downloader created by the same developers behind IcedID, which TA578 adopted almost exclusively from January 2024. The group's signature delivery tactic is impersonating companies sending legal threats for alleged copyright infringement via website contact forms, creating urgency through legal pressure rather than standard phishing lures. TA578 previously distributed IcedID and Bumblebee before pivoting to Latrodectus, and also delivered the downloader via DanaBot infection in at least one observed campaign.
expand profile
active since~2020 (IcedID/Bumblebee distribution; Latrodectus first use December 2023; copyright infringement lure campaign February 20, 2024; ongoing as of 2025)
also known asTA578 (Proofpoint designation) — initial access broker; Latrodectus primary distributor from January 2024; previously distributed IcedID and Bumblebee
primary motivationFinancial — initial access brokerage / Latrodectus delivery for downstream payload deployment
mitre groupUnassigned
primary targets
Broad commercial targeting (opportunistic)
Organizations with public website contact forms
Any sector where initial access has downstream value
typical methods
Contact form abuse: sends messages directly through target websites' contact forms to impersonate companies alleging copyright infringement — legal pressure lures create urgency and bypass email security filters (messages originate from legitimate contact form infrastructure, not spoofed email domains); copyright infringement lure campaign (February 20, 2024): impersonated various companies sending legal threats about alleged image/content misuse; Latrodectus (primary payload from January 2024): downloader created by IcedID developers — resolves Windows API functions dynamically by hash, checks for debuggers, gathers OS information, checks running processes, verifies no existing Latrodectus infection, installs via AutoRun key and Scheduled Task, posts encrypted system info to C2, requests bot download; Latrodectus C2 infrastructure live from September 18, 2023 connected to upstream Tier 2 servers with IcedID backend infrastructure; DanaBot used as initial delivery in at least one December 2023 campaign to drop Latrodectus; previously distributed IcedID (shared infrastructure with historic IcedID operations) and Bumblebee before transition; Latrodectus serves as downloader enabling ransomware and other payload deployment by downstream actors who purchase access.
view full profile
RX
RansomEXX / Defray777
Unknown — big game hunting operator
ransomware
active
An early pioneer of VMware ESXi-targeted ransomware — SPRITE SPIDER (CrowdStrike's designation for the operators) began developing Linux variants specifically to encrypt virtualized environments as early as July 2020, years before ESXi targeting became common. The group runs low-volume, highly targeted big game hunting campaigns, building unique ransomware binaries per victim containing victim-specific RSA public keys. RansomEXX and Defray777 represent the same malware family under different naming conventions — Defray777 is the later, more sophisticated Linux/ESXi-capable evolution of the original Defray Windows ransomware.
expand profile
active since~2018 (Defray777 variant; Linux ESXi capability from July 2020; notable victims include Texas Dept of Transportation, Groupe Atlantic; active through present)
also known asDefray, Defray 2018, Target777, RansomX, RansomEXX — SPRITE SPIDER (CrowdStrike); GOLD DUPONT (Secureworks); operators attributed to same group across all naming conventions
primary motivationFinancial — low-volume big game hunting ransomware targeting large enterprises with ESXi environments
mitre groupUnassigned
primary targets
VMware ESXi hypervisor environments
Healthcare, education, manufacturing, government
US, Canada, Australia, Japan, France, Brazil
High-tech, construction, engineering sectors
typical methods
Low-volume, targeted intrusions rather than mass phishing; initial access via: exploiting vulnerable Citrix Application Delivery Controllers; BokBot trojan (from LUNAR SPIDER); Vatet loader; post-access toolkit: PyXie RAT for persistent remote access, Cobalt Strike for lateral movement, Lazagne and Mimikatz for credential theft; targets domain controllers as priority pivot point; data exfiltration before ransomware deployment; ESXi targeting procedure: authenticate to vCenter web interface using harvested credentials; write Linux Defray777 binary to /tmp/ with legitimate-looking filename (e.g., svc-new); enumerate ESXi system info via uname, df, esxcli vm process list; terminate all running VMs to unlock VMDK files for encryption; optionally uninstall VMware FDM via VMware-fdm-uninstall.sh to prevent automatic VM restarts; encrypt VM disk files using AES-256 ECB per-file with unique key, then RSA-4096 encrypt each key using victim-specific embedded public key; unique Defray777 build per victim containing unique RSA key pair — victim receives private key only upon payment; Windows variant also deletes Volume Shadow Copies; in-memory-only deployment of later-stage tooling to evade detection; ransom demands tailored individually per victim organization.
view full profile
DS
DeathStalker
Unknown — mercenary hack-for-hire
apt
active
A mercenary APT group with an unusually narrow commercial focus: law firms, fintech companies, wealth consultancy firms, and financial advisors — the kinds of organizations that hold sensitive business intelligence, merger and acquisition details, and client financial data with high value to commercial competitors or litigants. DeathStalker does not deploy ransomware or steal payment data for resale. Kaspersky assesses the group acts as an information broker or hacker-for-hire in financial circles, selecting targets based on perceived value or client requests. Active since at least 2012, the group has operated entirely below the threshold of state-sponsored threat actors while demonstrating consistent tooling evolution across Powersing, Evilnum, and Janicab malware families.
expand profile
active since~2012 (possibly earlier; Kaspersky tracking from 2018; Powersing, Evilnum, Janicab malware families linked with medium confidence; ongoing activity into 2024)
also known asDeathStalker (Kaspersky GReAT designation) — probable mercenary/information broker model; Evilnum malware family reported separately by other vendors; no state attribution
primary motivationCommercial espionage / hack-for-hire — sensitive business intelligence from financial and legal sectors
mitre groupG0119
primary targets
Law offices and legal firms globally
Fintech companies and financial advisors
Wealth consultancy firms
UAE, Lebanon, Turkey (Middle East focus)
Argentina, Cyprus, Israel, UK, Switzerland, Taiwan
typical methods
Interactive spearphishing social engineering — not a single malicious email but a persistent conversation with a pretext or persona to build trust before delivering the payload; spearphishing with malicious archive attachments containing LNK (shortcut) files as primary delivery; Powersing (PowerShell-based implant): periodically captures screenshots of victim's desktop, executes arbitrary PowerShell scripts from C2, adapts persistence mechanisms based on security solution detected on host — group tests each target environment and customizes scripts accordingly; dead-drop resolvers: C2 communications hidden behind legitimate services (social media, blogging platforms, messaging services) — victims reach out to resolvers which redirect to real C2 infrastructure, hiding the communication chain and enabling rapid campaign termination; Evilnum malware family: credential and financial document theft targeting fintech specifically; Janicab malware family: older toolset with YouTube-based dead-drop resolvers; all three families share victimology and infrastructure with medium confidence linkage; no ransomware, no payment data theft — collection objective is sensitive business and legal documents; highly adaptive: Kaspersky notes the group studies each target, runs detection tests, and updates scripts per campaign before deployment; global targeting primarily SMBs that typically invest less in security than large enterprises.
view full profile
IK
TA456 / Imperial Kitten
Iran — IRGC-affiliated
nation-state
active
One of the most patient social engineers in the Iranian threat ecosystem — documented spending multiple years cultivating a single fake persona ("Marcella Flores," an aerobics instructor from Liverpool) across Facebook, Instagram, and email chains before deploying the LEMPO malware against a specific US aerospace defense contractor employee. Proofpoint assesses TA456 as among the most determined Iranian-aligned threat actors specifically because of this operational investment in long-term human engagement. The group's targeting aligns with IRGC strategic intelligence requirements — aerospace, defense contractors, and military supply chains, especially those with Middle East operational footprints.
expand profile
active since~2017–2018 (Symantec first documented July 2018 as Tortoiseshell targeting Saudi IT providers; ongoing — MINIBIKE/MINIBUS campaigns through 2024)
also known asTortoiseshell, Crimson Sandstorm, Curium, Yellow Liderc, UNC1549 (overlap), DustyCave — IRGC-affiliated; Mahak Rayan Afraz (MRA) Iranian IT company linked by Facebook in July 2021
primary motivationEspionage — IRGC strategic intelligence requirements / aerospace and defense contractor targeting
mitre groupG1021
primary targets
US aerospace and defense industrial base
Middle East aerospace, aviation, defense (Israel, UAE)
IT providers in Saudi Arabia (supply chain 2018–2019)
Transportation, logistics, technology (Middle East)
typical methods
Multi-year fake persona campaigns on Facebook, Instagram, and Gmail — "Marcella Flores" aerobics instructor persona cultivated for years before malware delivery attempt; Proofpoint confirmed the relationship began in 2019 and malware attempt made in June 2021; fake job offer lures for defense/tech positions (MINIBIKE/MINIBUS campaigns 2022–2024): spearphishing emails with links to fake websites containing Israel-Hamas content or phony job offers for thermal imaging specialists; LEMPO (VBScript RAT): dropped by Excel macro, enumerates host via built-in Windows commands (netstat, net use), exfiltrates reconnaissance data to actor-controlled email address via CDO/SMTPS, then deletes host artifacts to cover tracks; MINIBIKE and MINIBUS backdoors: deployed via Microsoft Azure C2 infrastructure (2022–2024 campaigns); IMAPLoader: deployed via watering hole attacks (strategic web compromises) — uses IMAP email protocol for C2; Syskit backdoor, IvizTech RAT, Liderc reconnaissance tool (earlier campaigns); 2018–2019 Saudi IT provider supply chain attacks: custom + off-the-shelf malware, domain admin-level access achieved in some cases; actively targets smaller subsidiaries and contractors as supply chain entry points to larger defense organizations; Facebook persona network disrupted by Facebook July 15, 2021, attributed to Mahak Rayan Afraz (MRA).
view full profile
EP
APT27 / Emissary Panda
China — MSS-affiliated
nation-state
active
One of China's most prolific and long-running espionage groups — active since at least 2010 and still conducting operations through 2025. APT27 is characterized by sustained, long-term intelligence collection rather than disruption or financial gain, though unusual ransomware incidents using BitLocker have been attributed to the group, possibly opportunistic monetization. In March 2025, the US Department of Justice unsealed indictments against two APT27 operators — Yin Kecheng and Zhou Shuai — for campaigns spanning August 2013 through December 2024, including an intrusion into the US Department of the Treasury. A $2 million reward has been offered for information leading to their arrest; both remain at large in China.
expand profile
active since~2010 (documented from 2012; Yin Kecheng/Zhou Shuai indicted for operations 2013–2024; US Treasury intrusion December 2024; ongoing)
also known asLuckyMouse, Iron Tiger, Bronze Union, TG-3390, Budworm, BRONZE UNION, Linen Typhoon — MSS-affiliated; Yin Kecheng and Zhou Shuai ("Coldface") indicted March 2025; $2M DOJ reward outstanding
primary motivationEspionage — long-term intelligence collection aligned with China's strategic, military, and economic interests
mitre groupG0027
primary targets
Government agencies and embassies globally
Defense contractors and aerospace
Technology, manufacturing, energy sectors
Middle East, Europe, Central Asia, North America
US Department of the Treasury (December 2024)
typical methods
Spearphishing and exploitation of internet-facing services as primary initial access; web shell deployment (China Chopper, TwoFace) for persistence on compromised servers; SharePoint server exploitation (Middle East government campaigns); Zoho ManageEngine ADSelfService Plus (CVE-2021-40539) and Microsoft Exchange exploitation for German targets; SysUpdate backdoor (multi-platform, Linux and Windows — deployed via DLL sideloading using legitimate INISafeWebSSO application); HyperBro backdoor for persistent access; PlugX/Korplug (shared across Chinese APTs); ZxShell, Gh0st RAT for remote access; Clambling backdoor (Dropbox-based C2); national data center compromise for country-level watering hole campaigns; AdFind, curl, SecretsDump, PasswordDumper for post-compromise credential and network discovery; living-off-the-land techniques; code-signing certificate manipulation (VMPsoft/VMProtect certificate abused for SysUpdate loader signing); RSHELL malware (Germany alert July 2024); occasional ransomware incidents: BitLocker used as encryption tool in one attributed case (unusual — not typical for this group); supply chain compromise via third-party service providers; operators brokered stolen data for sale to customers including PRC government and military contacts.
view full profile
A16
APT16
China — East Asia espionage
nation-state
active
A China-attributed espionage group with an unusually narrow geographic and sectoral focus — targeting exclusively Japanese and Taiwanese organizations in media, government, high-tech, and financial services since at least 2012. APT16 is notable for the precision of its social engineering: lure documents reference real events, real organizations, and real conferences relevant to the target's professional context — a 2015 campaign used the subject "2015 Taiwan Security and Cultural Forum Invitation Form" in authentic Chinese, designed to pass scrutiny from the recipients it was targeting. The group uses compromised legitimate websites as staging servers for second-stage payloads, keeping its own infrastructure harder to attribute.
expand profile
active since~2012 (documented campaigns through 2015; November–December 2015 coordinated spearphishing campaign against Japan and Taiwan; post-2015 attribution sparse in public reporting)
also known asOpTaiwan (campaign name) — MITRE G0023; China state-attributed based on targeting, operational tempo, and resource indicators
primary motivationEspionage — Japan and Taiwan political, governmental, journalistic, and technology intelligence
mitre groupG0023
primary targets
Taiwanese media organizations and webmail users
Japanese organizations (high-tech, government)
Political institutions and policy organizations
Financial services (Japan and Taiwan)
typical methods
Spearphishing with malicious Microsoft Word documents as primary delivery — documents exploit EPS dict copy use-after-free vulnerability chained with local Windows privilege escalation (CVE-2015-1701); lure documents are contextually tailored to recipients: real conference names, real organizations, in-language Chinese content for Taiwanese targets; lure themes include Taiwan security forum invitations, Taiwanese auction site registration instructions, and cross-strait political content; compromised legitimate websites used as staging infrastructure for second-stage payload delivery — reduces attribution risk versus attacker-owned infrastructure; IRONHALO: downloader — fetches real payload from attacker-controlled or compromised staging servers after successful exploitation; ELMER: persistent backdoor — remote command execution, file access, data exfiltration via HTTP/HTTPS with encryption or protocol obfuscation; DOORJAMB: secondary implant used in select campaigns for reconnaissance and additional access; all three deploy only after successful exploit chain execution; June 2015 Taiwan Security Forum campaign: delivered DOORJAMB alongside ELMER via highly specific lure referencing genuine Taiwanese security community event.
view full profile
DB
Dragon Boss Solutions profile
UAE (Sharjah) — global endpoint compromise
cybercrime
active
A UAE-registered software operation whose signed adware silently disabled antivirus protection on more than 25,000 endpoints across 124 countries — a global sinkhole observation independently reported by Huntress, BleepingComputer, Dark Reading, Infosecurity Magazine, and Arabian Post. Dragon Boss's browser family (Chromnius, Chromstera, Web Genius, Artificius) was flagged as adware/PUP by PCRisk, Gridinsoft, and community forums as early as 2023 before its signed update channel began delivering a PowerShell AV killer (ClockRemoval.ps1) as a silent MSI in late March 2025. Victim networks spanned universities, operational technology in energy and transport, municipal governments and public utilities, K-12 schools, healthcare providers, and multiple Fortune 500 companies. The primary update domain was left unregistered — a domain registration (reported across coverage as roughly $10) would have given any party arbitrary remote code execution across every infected host with no AV present.
expand profile
active sinceLate 2024 (loaders/updaters observed on victim hosts); AV-killing payload first pushed late March 2025; Huntress alert-triggering date March 22, 2026; public disclosure April 14, 2026 with follow-on coverage from BleepingComputer, Dark Reading, Cybernews, Infosecurity Magazine, TechRadar, GBHackers, and Arabian Post
also known asDragon Boss Solutions LLC; Chromnius; Chromstera Browser; Web Genius; Artificius Browser; DragonBoss (AV detection label); No MITRE group ID assigned
primary motivationAdware revenue via browser hijacking and Bing Rewards points monetization (HackerDose, June 2024); AV removal protects ad-injection revenue stream; infrastructure positioned for ransomware, cryptomining, or data-theft pivot (pivot risk independently noted by Infosecurity Magazine, Dark Reading, TechRadar, and Rescana)
registered entityDragon Boss Solutions LLC — Sharjah Media City (Shams) free zone, UAE; CrunchBase description: "search monetization research"; Facebook listing confirms Sharjah Media City address; Vivaldi Forum (April 2023) and PCRisk removal guides (2023-2024) documented the product family years before the AV-killer disclosure
primary targets
221 universities and colleges globally
41 OT networks (energy, transport, critical infrastructure)
35 municipal governments, state agencies, public utilities
24 primary and secondary schools
3 healthcare organizations
Multiple Fortune 500 companies
General consumer endpoints (53.9% US)
124 countries affected
typical methods
PUP/adware bundling as initial access via free-software installers with EULA consent (distribution pattern independently documented by PCRisk, Gridinsoft, and MalwareTips community forums from 2023 onward). Signed executables using a legitimate Dragon Boss Solutions LLC Authenticode certificate; pseudo-random binary naming pattern ([Word][Word][Number].exe, e.g. RaceCarTwo.exe, TableBoatThree.exe). Advanced Installer off-the-shelf update framework polling remote MSI update servers with no user interaction — silent-install, PerMachine-elevated, non-disableable auto-checks (Advanced Installer abuse independently described by Huntress, BleepingComputer, Rescana, and Arabian Post). ClockRemoval.ps1 PowerShell payload delivered via msiexec as a GIF-disguised MSI (flagged by only 5 VirusTotal vendors at disclosure per BleepingComputer). Payload behavior: pre-execution sandbox/VM detection; registry query for installed AV (Malwarebytes, Kaspersky, McAfee, ESET — confirmed across Huntress, BleepingComputer, Infosecurity Magazine, TechNadu, Rescana); 100ms polling kill loop for 20 seconds at boot; five SYSTEM scheduled tasks (boot, startup, logon, recurring 30-min); WMI event subscriptions (Win32_ProcessStartTrace catches renamed AV installers); registry service-key stripping; silent vendor uninstaller execution; hosts file poisoning to null-route AV update domains; Windows Defender exclusions for non-existent staging directories (DGoogle, EMicrosoft, DDapps); modified Chrome binaries with --simulate-outdated-no-au="01 Jan 2199" flag to permanently disable browser auto-updates (corroborated by Cybersecurity News, Cryptika, Cyberpress). Primary C2 domain left unregistered (chromsterabrowser[.]com) — sinkholed April 2026, with multiple outlets (Huntress, Cyberpress, TechRadar, Arabian Post) noting that a domain registration costing roughly $10 would have been sufficient to inherit arbitrary RCE across all affected hosts. MITRE TTPs: T1553.002 (Code Signing), T1562.001 (Disable or Modify Tools), T1546.003 (WMI Event Subscription), T1547 (Boot/Logon Autostart), T1112 (Modify Registry), T1218.007 (Msiexec proxy execution), T1059.001 (PowerShell). Detection rules and cleanup scripts published independently by SOC Prime; structured incident analysis published by Rescana; regional UAE-registry angle developed by Arabian Post and Cryptika (Dubai).
view full profile