Skip to content

Threat Actors

Section Overview

Comprehensive catalog of cyber threat actors -- nation-state, cybercrime, and emerging adversaries -- with analysis of their techniques, capabilities, and implications for the cybersecurity product market.

Threat Actors

Comprehensive catalog of cyber threat actors --- nation-state, cybercrime, and emerging adversaries --- with analysis of their techniques, capabilities, and market implications.

This section provides a structured reference for the adversaries driving demand across every cybersecurity market segment. Understanding who is attacking, how they operate, and what they target is essential context for evaluating defensive products, identifying underserved market gaps, and anticipating where the next wave of security spending will flow.

The threat actor landscape has become more complex, more interconnected, and more commercially driven than at any point in the history of cybersecurity. The traditional boundaries between nation-state espionage, organized cybercrime, and ideological hacktivism have eroded to the point where attribution itself has become one of the hardest problems in the field. A single intrusion may involve a nation-state sponsor, a criminal initial access broker, a ransomware-as-a-service platform, and a hacktivist front -- all operating within the same kill chain.

This catalog attempts to impose structure on that complexity. Each group is listed with all known aliases across major vendor taxonomies, its assessed origin and objectives, current activity status, and a summary of key tactics, techniques, and procedures (TTPs). Where deep-dive analysis pages exist, they are linked directly.

How to Use This Page

This index serves multiple audiences:

  • Product teams and builders should use the Category Comparison and Market Implications sections to understand which threat actors create demand for which product categories. If you are building an OT/ICS security product, the China and Russia sections -- particularly Volt Typhoon, Sandworm, and CyberAv3ngers -- define your threat model.
  • Investors and analysts should focus on the Convergence Trends and Market Implications sections to understand how threat actor evolution drives market growth. The ransomware ecosystem's resilience despite law enforcement takedowns, for example, signals sustained demand for EDR, MDR, and data security products.
  • Security practitioners and CISOs should use the Master Threat Actor Table as a lookup reference when consuming threat intelligence from multiple vendor sources. The Vendor Naming Conventions section helps resolve the alias problem that plagues multi-vendor environments.
  • Threat intelligence analysts should use the deep-dive links to access detailed per-actor analysis, including MITRE ATT&CK mappings, campaign timelines, and IOC references.

Threat Actor Taxonomy

The following diagram illustrates the major categories of threat actors and the operational relationships between them. These boundaries are increasingly blurred: nation-states outsource to cybercriminals, ransomware groups adopt state-level TTPs, and hacktivists serve as proxies for intelligence agencies.

Cyber Threat ActorsNation-StateCybercrimeIdeologicalInternalEmergingChina\nEspionage & IP Theft Russia\nEspionage & Disruption North Korea\nRevenue & Espionage Iran\nDisruption & Espionage Ransomware\nOperators & Affiliates Initial Access BrokersCybercrime Markets\n& MaaS HacktivismInfluence OperationsInsider Threats\nMalicious & Negligent AI-Augmented\nThreat Actors outsource operationsproxy campaignsrevenue generationsell access totools & infrastructuretools & infrastructureenhances all categoriesenhances all categoriesproxy groupsdestructive opssupports

Key observations from the taxonomy:

  • Nation-state actors sit at the top of the sophistication pyramid but increasingly rely on criminal infrastructure (initial access brokers, commodity malware, bulletproof hosting) to maintain operational tempo and complicate attribution.
  • Cybercrime has fully industrialized. The ransomware-as-a-service (RaaS) model means that the developer, the affiliate who deploys the ransomware, and the initial access broker who sold the foothold may all be different entities with no direct organizational relationship.
  • Ideological actors (hacktivists) have been revitalized by the Russia-Ukraine conflict and the Israel-Hamas war, but many "hacktivist" groups are state-directed or state-tolerated proxies rather than independent movements.
  • Insider threats remain the most difficult category to address with technology alone, requiring a combination of identity controls, data security, and organizational culture.
  • AI-augmented threats are not yet a separate category of actor but are amplifying the capabilities of every existing category, lowering the barrier to entry for less sophisticated groups.

Several structural shifts are reshaping how these categories interact:

  1. State-criminal convergence. North Korea's Lazarus Group operates ransomware to fund the regime. Russian intelligence services tolerate (and occasionally task) cybercriminal groups like Evil Corp. Iran-linked actors deploy wipers disguised as ransomware. The line between "state actor" and "criminal" is increasingly a policy fiction.

  2. The initial access broker economy. IABs have created a liquid market for network access, decoupling the "break-in" phase from the "exploit" phase. A single compromised VPN credential sold on a dark web forum may be purchased by a ransomware affiliate, a nation-state proxy, or both. This commoditization of access means that even sophisticated actors may begin their operations with tools and accesses that look identical to commodity crime.

  3. Hacktivist laundering. State intelligence services increasingly use hacktivist personas to conduct operations that would be diplomatically costly if attributed to government agencies. The GRU's use of XakNet and similar fronts, and Iran's use of CyberAv3ngers, exemplify this pattern. The operational security is often deliberately poor -- the goal is plausible deniability, not genuine anonymity.

  4. Ransomware ecosystem fragmentation and reformation. Law enforcement takedowns (Hive in January 2023, LockBit in February 2024, ALPHV/BlackCat exit scam in March 2024) disrupt but do not destroy the ecosystem. Affiliates, developers, and operators reform under new brands within weeks. The technical barriers to launching a new RaaS have never been lower.

  5. Supply chain as the preferred vector. Across all actor categories, the trend toward supply chain compromise -- whether targeting MSPs (APT10), software vendors (APT29/SolarWinds), or file transfer platforms (Cl0p/MOVEit) -- reflects a rational optimization: compromise one supplier, gain access to thousands of downstream targets.


Category Comparison

Category Primary Objective Sophistication Resources Typical Targets Dwell Time Key Segments Impacted
China (Nation-State) Espionage, IP theft, pre-positioning Very High State-funded, large teams Government, defense, telecom, tech, critical infrastructure Months to years Endpoint, Network, Cloud, Threat Intel, OT/IoT
Russia (Nation-State) Espionage, disruption, geopolitical influence Very High State-funded (GRU, SVR, FSB) Government, energy, elections, NATO members Weeks to years Endpoint, Network, Email, OT/IoT, Identity
North Korea (Nation-State) Revenue generation, espionage High State-funded (RGB) Cryptocurrency, financial institutions, defense, media Weeks to months Endpoint, Identity, Cloud, Data Security
Iran (Nation-State) Disruption, espionage, regional influence Moderate-High State-funded (IRGC, MOIS) Energy, government, dissidents, Israel/Gulf states Days to months OT/IoT, Email, Network, Identity
Ransomware Financial extortion Moderate-High Self-funded (RaaS profits) Healthcare, education, manufacturing, SMBs Hours to days Endpoint, Network, Data, MDR/MSSP, Email
Initial Access Brokers Sell network access Moderate Independent operators Any organization with resale value Minutes to days Identity, Vuln/ASM, Email
Cybercrime Markets Enable crime-as-a-service Varies Underground economy Infrastructure providers, enablers N/A (infrastructure) Threat Intel, Email, Identity
Hacktivism Disruption, publicity, ideology Low-Moderate Volunteer / state-proxied Government, corporations, perceived adversaries Minutes to hours Network (DDoS), AppSec, Cloud
Influence Operations Narrative manipulation Moderate State or political funding Public opinion, elections, social media Persistent Email, Security Awareness
Insider Threats Varies (financial, ideological, negligence) Low-High Privileged access Employer organization Ongoing Data Security, Identity, GRC
AI-Augmented Amplify existing objectives Rapidly increasing Accessible AI tooling Broadening target surface Decreasing (faster ops) Email, AppSec, Identity, Security Awareness

Reading the Table

"Key Segments Impacted" refers to the cybersecurity market segments (as defined in the Segments Overview) where each actor category drives the most demand. A ransomware wave that hits healthcare, for example, drives spending in Endpoint, MDR/MSSP, Data Security, and Email Security simultaneously.

Actor Sophistication Spectrum

The sophistication spectrum is not static -- it shifts as tools and techniques proliferate downward from advanced actors to commodity criminals:

  • Tier 1 (Very High): Custom zero-day development, supply chain implants, firmware-level persistence, satellite C2 hijacking, living-off-the-land at scale. Examples: Volt Typhoon, APT29, Sandworm, Turla.
  • Tier 2 (High): Exploitation of known vulnerabilities within days of disclosure, custom malware families, advanced social engineering, multi-stage intrusion chains. Examples: APT41, Lazarus, APT28, Cl0p.
  • Tier 3 (Moderate): Use of commodity tools (Cobalt Strike, Metasploit), purchased exploits, off-the-shelf RATs, established RaaS platforms. Examples: Most ransomware affiliates, FIN12, Scattered Spider.
  • Tier 4 (Low): DDoS-for-hire, defacement tools, public exploit scripts, phishing kits purchased from underground markets. Examples: Most hacktivist groups, low-tier IABs, script-based actors.

A critical dynamic: techniques that were Tier 1 two years ago are often Tier 3 today. Living-off-the-land techniques pioneered by advanced Chinese actors are now used by ransomware affiliates. OAuth and cloud token abuse demonstrated by APT29 is now a standard part of the cybercrime playbook. AI-augmented phishing, once hypothetical, is now accessible to anyone with access to an LLM. This downward diffusion of techniques is a primary driver of the expanding attack surface that cybersecurity vendors must address.


Vendor Naming Conventions

Different threat intelligence vendors assign their own names to the same actor groups, creating significant confusion. A single group like APT28 may appear as "Fancy Bear" in CrowdStrike reporting, "Forest Blizzard" in Microsoft advisories, "Sofacy" in Kaspersky research, and "Iron Twilight" in Secureworks analysis. This reference table maps the major naming schemes.

Understanding the Naming Problem

The proliferation of naming conventions is not merely an inconvenience -- it actively hinders threat intelligence sharing and operational coordination. When a CISO receives alerts referencing "Midnight Blizzard" from Microsoft Defender, "Cozy Bear" from CrowdStrike Falcon, and "APT29" from Mandiant, correlating these as the same actor requires either deep expertise or a lookup table. This fragmentation has spawned an entire sub-industry of threat intelligence platforms focused on entity resolution and alias mapping.

The table below maps naming conventions across the ten most widely referenced threat intelligence vendors.

Naming Scheme by Vendor

Vendor Naming Convention China Russia North Korea Iran Cybercrime Unknown/Emerging
CrowdStrike Animals Panda Bear Chollima Kitten Spider Jackal, Hawk, Lynx
Microsoft Weather Typhoon Blizzard Sleet Sandstorm Tempest / Storm Storm-XXXX (dev designations)
Mandiant / Google APT/FIN/UNC numbers APT1, 10, 15, 27, 30, 31, 40, 41 APT28, 29 APT37, 38, 43 APT33, 34, 35, 42 FIN4-13 UNC groups
Dragos Minerals/Elements (ICS-focused) Voltzite, Vanadinite Electrum, Kamacite, Stibnite Covellite Magnallium, Parisite Wassonite various
Secureworks Color + element Bronze (China) Iron (Russia) Nickel (NK) Cobalt (Iran) Gold (crime) Tin, Silver (other)
Kaspersky Descriptive names various Sofacy, Turla, Dukes Lazarus, Kimsuky OilRig, Shamoon various --
ESET Descriptive / themed SpadeAce, Winnti Sednit, Sandworm, Gamaredon Lazarus, Kimsuky Agrius, OilRig various --
Palo Alto (Unit 42) Constellation-themed various Cloaked Ursa, Fighting Ursa various Spectral Kitten various --
Recorded Future TAG-XX format TAG-22, TAG-74 TAG-70, TAG-110 TAG-71 TAG-56 various --
Proofpoint TA-XXXX format TA413, TA416 TA422, TA473 TA406, TA444 TA450, TA453, TA455, TA456 TA505, TA542, TA570, TA577 --

Navigating the Alias Problem

The Master Threat Actor Table below includes all major aliases for each group. When researching a specific actor, use the alias columns to cross-reference across vendor reports. Microsoft's weather-based taxonomy (introduced April 2023) is increasingly adopted as a de facto standard due to Microsoft Threat Intelligence's broad telemetry and the systematic, predictable naming structure. CrowdStrike's animal-based names remain dominant in incident response contexts. MITRE ATT&CK group pages serve as the closest thing to a neutral, consensus reference.


Master Threat Actor Table

This catalog organizes all major known threat actor groups by origin and category. The Deep-Dive column links to detailed analysis pages where available. Groups are listed roughly in order of current assessed activity level and impact within each category.

Table Column Guide

  • Group Name: The most commonly used name in current reporting (preference given to the name used by the vendor that tracks the group most closely)
  • Aliases: All known names from major vendors. This is critical for cross-referencing vendor reports
  • Origin: Assessed country of origin and, where known, the specific government agency or organizational affiliation
  • Category: Nation-State, Cybercrime, Hacktivist, or hybrid designations for actors that span categories
  • Primary Objective: The assessed strategic goal -- espionage, financial gain, disruption, or a combination
  • Active?: Current operational status: Yes (active in 2025-2026), Low activity, Dormant, Disrupted (by law enforcement), or Disbanded
  • Key TTPs: Summary of the most distinctive tactics, techniques, and procedures. Deep-dive pages contain full MITRE ATT&CK mappings
  • Deep-Dive: Link to detailed analysis page, or "--" if not yet available

China

China-linked actors represent the largest and most diverse nation-state cyber program, with an estimated dozens of distinct operational teams under multiple government and military organizations. Operations span from strategic pre-positioning in critical infrastructure (Volt Typhoon) to mass espionage campaigns targeting intellectual property, government secrets, and telecom infrastructure. Many groups are assessed to operate under the Ministry of State Security (MSS), the People's Liberation Army Strategic Support Force (PLA SSF), or contracted civilian entities that provide offensive capabilities on a quasi-commercial basis.

The 2024-2025 period saw two watershed developments in China-attributed operations:

  • Volt Typhoon represented a strategic shift from espionage to pre-positioning -- maintaining persistent access in U.S. critical infrastructure (water, energy, transportation, communications) without conducting any data exfiltration, strongly suggesting preparation for potential destructive or disruptive operations during a future conflict. CISA Director Easterly described this as China "burrowing in" to critical infrastructure.
  • Salt Typhoon compromised at least nine U.S. telecommunications providers, gaining access to lawful intercept systems (wiretap infrastructure) and the communications metadata of senior U.S. government officials. This was described by Senator Warner as "the worst telecom hack in our nation's history."

These operations, combined with the sheer breadth of Chinese cyber activity (25+ distinct tracked groups), make China the most significant nation-state cyber threat by volume and scope.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
Volt Typhoon Vanguard Panda, Bronze Silhouette, Voltzite, DEV-0391 China (PRC) Nation-State Pre-positioning in critical infrastructure Yes Living-off-the-land (LOTL), SOHO router botnets, no malware deployment, credential harvesting China
Salt Typhoon GhostEmperor, FamousSparrow China (PRC) Nation-State Telecom espionage, lawful intercept compromise Yes Router implants, telecom infrastructure exploitation, wiretap system access China
APT41 Winnti, Wicked Panda, Barium, Double Dragon, Bronze Atlas, TG-2633 China (PRC) Nation-State / Cybercrime Espionage + financial crime (dual mission) Yes Supply chain attacks, rootkits, game industry targeting, SQL injection, custom backdoors China
APT10 Stone Panda, MenuPass, Red Apollo, CVNX, Bronze Riverside, POTASSIUM China (PRC) Nation-State Espionage, MSP targeting Yes Cloud Hopper campaign, MSP compromise, spear-phishing, DLL side-loading --
APT31 Zirconium, Violet Typhoon, Judgment Panda, Bronze Vinewood China (PRC) Nation-State Political espionage, IP theft Yes Router exploitation, SOHO device botnets, spear-phishing, zero-days --
APT3 Gothic Panda, Buckeye, UPS Team, TG-0110, Pirpi China (PRC) Nation-State Defense and technology espionage Dormant Browser zero-days, custom RATs, lateral movement via Windows exploits --
APT17 Deputy Dog, Axiom, Aurora Panda, Elderwood China (PRC) Nation-State Technology and defense espionage Low activity Watering hole attacks, zero-day exploits, TechNet abuse for C2 --
Mustang Panda Bronze President, RedDelta, TA416, Earth Preta, Stately Taurus, Camaro Dragon China (PRC) Nation-State Geopolitical espionage (SE Asia, Europe) Yes USB-propagated malware, PlugX/Korplug, spear-phishing with lure documents --
Aquatic Panda Earth Lusca (partial overlap), RedHotel (partial overlap) China (PRC) Nation-State Espionage + opportunistic intrusion Yes Log4Shell exploitation, Cobalt Strike, credential harvesting, web exploitation --
Hafnium Silk Typhoon China (PRC) Nation-State Espionage via zero-day exploitation Yes Exchange Server zero-days (ProxyLogon), web shells, cloud token theft --
APT27 Emissary Panda, Iron Tiger, Lucky Mouse, Bronze Union, TG-3390 China (PRC) Nation-State Espionage, opportunistic ransomware Yes SysUpdate backdoor, HyperBro RAT, SharePoint exploitation, China Chopper web shell --
APT15 Vixen Panda, Ke3chang, Nickel, Bronze Palace, Playful Dragon China (PRC) Nation-State Diplomatic and government espionage Yes Custom backdoors (Ketrum, Okrum), VPN exploitation, long-term persistent access --
APT40 Leviathan, Kryptonite Panda, Gingham Typhoon, Bronze Mohawk, TEMP.Periscope China (PRC) Nation-State Maritime, defense, and regional espionage Yes Spear-phishing, web compromise, SOHO device exploitation, ScanBox framework --
Naikon APT30, Override Panda, Lotus Panda China (PRC) Nation-State Southeast Asian government espionage Yes Aria-body RAT, DLL hijacking, long-term access to government networks --
Gallium Granite Typhoon, GALLIUM, Alloy Taurus China (PRC) Nation-State Telecom and financial espionage Yes PingPull RAT, SoftEther VPN abuse, web shell deployment, living-off-the-land --
Blackfly APT41 subgroup, Grayfly China (PRC) Nation-State Espionage targeting Asia Yes ShadowPad, Winnti backdoor, supply chain compromise --
Earth Lusca TAG-22, Charcoal Typhoon (partial) China (PRC) Nation-State Espionage + financial crime Yes Cobalt Strike, ShadowPad, vulnerability exploitation, watering holes --
LightBasin UNC1945 China (assessed) Nation-State Telecom infrastructure espionage Yes Custom Linux/Solaris implants, telecom protocol exploitation, GPRS tunneling --
RedHotel TAG-22 (partial), Charcoal Typhoon (partial), Aquatic Panda (partial) China (PRC) Nation-State Espionage across government and tech Yes ShadowPad, Winnti, Cobalt Strike, broad targeting across sectors --
BackdoorDiplomacy TA413, Stately Taurus (partial) China (PRC) Nation-State Diplomatic espionage (Africa, Middle East) Yes Quarian backdoor, Turian backdoor, exploitation of internet-facing devices --
Flax Typhoon Ethereal Panda China (PRC) Nation-State Persistent access, IoT botnet operations Yes LOTL techniques, IoT device compromise (Raptor Train botnet), minimal malware --
Charcoal Typhoon Chromium, ControlX China (PRC) Nation-State Espionage targeting government and tech Yes Cobalt Strike, exploitation of public-facing apps, credential harvesting --
Raspberry Typhoon Radium, APT30 overlap China (PRC) Nation-State SE Asian government espionage Yes Spear-phishing, custom implants, long-term access operations --
APT5 Keyhole Panda, Manganese, Bronze Fleetwood China (PRC) Nation-State Telecom and tech espionage Yes Pulse Secure VPN zero-days, custom backdoors, network appliance targeting --
Periscope TEMP.Periscope, APT40 subgroup, Leviathan overlap China (PRC) Nation-State Maritime industry targeting Low activity Web shells, spear-phishing, AIRBREAK and HOMEFRY malware --
Daggerfly Evasive Panda, Bronze Highland, StormBamboo China (PRC) Nation-State Espionage targeting telecom and civil society Yes MgBot modular framework, ISP-level DNS poisoning, macOS malware, software update hijacking --

Russia

Russia-linked actors are divided across three primary intelligence services -- the GRU (military intelligence, responsible for APT28 and Sandworm), the SVR (foreign intelligence, responsible for APT29), and the FSB (domestic/signals intelligence, responsible for Turla, Gamaredon, and others). Additionally, Russia tolerates and occasionally directs cybercriminal groups that operate from Russian territory, creating a gray zone between state and criminal operations.

The Russia-Ukraine conflict has produced an unprecedented volume of destructive cyber operations (primarily by Sandworm/Seashell Blizzard and Cadet Blizzard/Ember Bear against Ukrainian targets) while simultaneously generating a new generation of hacktivist proxy groups that operate under the direction or tolerance of Russian intelligence. Notably, Russian cyber operations against Ukraine have been extensively documented by Microsoft, ESET, and CERT-UA, creating the most detailed public record of nation-state cyber warfare ever compiled.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
APT29 Cozy Bear, Midnight Blizzard, The Dukes, Nobelium, Dark Halo, Iron Hemlock, YTTRIUM Russia (SVR) Nation-State Strategic espionage (government, think tanks) Yes Supply chain attacks (SolarWinds), cloud exploitation, OAuth abuse, phishing via Teams, stealthy long-term access Russia
APT28 Fancy Bear, Forest Blizzard, Sofacy, Pawn Storm, Sednit, Strontium, Iron Twilight, TG-4127 Russia (GRU Unit 26165) Nation-State Espionage, election interference, disruption Yes Credential phishing, zero-day exploits, edge device exploitation, custom malware (XAgent, X-Tunnel) Russia
Sandworm Voodoo Bear, Seashell Blizzard, IRIDIUM, Electrum, TeleBots, Iron Viking, Black Energy Group Russia (GRU Unit 74455) Nation-State Destructive attacks, critical infrastructure Yes Wiper malware (NotPetya, Industroyer, CaddyWiper), ICS/SCADA attacks, supply chain, false flags Russia
Turla Venomous Bear, Secret Blizzard, Snake, Waterbug, Krypton, Iron Hunter Russia (FSB Center 16) Nation-State Long-term espionage Yes Satellite C2 hijacking, Snake rootkit, hijacking other APT infrastructure, watering holes, Kazuar backdoor --
Gamaredon Primitive Bear, Aqua Blizzard, Actinium, Shuckworm, Armageddon Russia (FSB, Crimea-based) Nation-State Ukraine-focused espionage Yes High-volume spear-phishing, VBS/PowerShell scripts, USB propagation, rapid retooling --
Star Blizzard COLDRIVER, Callisto Group, Seaborgium, TA446, BlueCharlie Russia (FSB Center 18) Nation-State Credential phishing of high-value targets Yes Highly targeted spear-phishing, credential harvesting, impersonation of academics/journalists --
Ember Bear Cadet Blizzard, DEV-0586, UNC2589 Russia (GRU) Nation-State Destructive operations, Ukraine targeting Yes WhisperGate wiper, web defacement, data theft and leak, hack-and-leak operations --
Evil Corp Indrik Spider, Dridex Gang, GOLD DRAKE, Manatee Tempest Russia Cybercrime / State-nexus Financial crime, ransomware Reduced (sanctions) Dridex trojan, WastedLocker, Hades ransomware, BitPaymer, SocGholish --
Energetic Bear Dragonfly, Crouching Yeti, Berserk Bear, Iron Liberty, Havex Russia (FSB) Nation-State Energy sector espionage and pre-positioning Low activity ICS/SCADA reconnaissance, supply chain (Havex trojan), watering holes, Citrix exploitation --
IndigoBolt Storm-0257 (possible) Russia (assessed) Nation-State Infrastructure targeting Yes Exploitation of edge devices, LOTL techniques --
RomCom Storm-0978, Tropical Scorpius, UNC2596, Void Rabisu Russia (assessed) Cybercrime / Espionage Dual-purpose: espionage and ransomware Yes Trojanized legitimate software, RomCom RAT, Underground ransomware, zero-day exploitation --
Gossamer Bear UTA0036 Russia (assessed) Nation-State Credential theft targeting government Yes Phishing campaigns, fake login pages, targeting of dissidents and NGOs --
UAC-0050 -- Russia/Ukraine conflict zone Nation-State Ukraine targeting, financial fraud Yes Remcos RAT, mass phishing, credential theft --
UAC-0006 -- Russia (assessed) Cybercrime Financial theft, Ukraine-focused Yes SmokeLoader, phishing, banking trojan deployment --
Winter Vivern TA473, UAC-0114 Russia/Belarus (assessed) Nation-State Government espionage (Europe) Yes Exploitation of Zimbra and Roundcube, spear-phishing, webmail zero-days --
XakNet -- Russia (GRU-linked) Hacktivism / State-proxy DDoS, hack-and-leak, Ukraine targeting Yes DDoS, data theft, coordination with Sandworm operations --
Void Blizzard -- Russia (GRU, assessed) Nation-State NATO and government espionage Yes Credential theft, email exfiltration, SharePoint data harvesting, Entra ID enumeration --

North Korea

North Korean cyber operations serve a unique dual purpose: intelligence collection and revenue generation for a sanctions-isolated regime. The Reconnaissance General Bureau (RGB) oversees most cyber units, with Lazarus Group and its subgroups responsible for an estimated $1.5B+ in cryptocurrency theft in 2024 alone (including the $1.5B Bybit hack in February 2025, the largest single cryptocurrency theft in history). The IT worker fraud scheme -- placing North Korean operatives in remote IT jobs at Western companies using stolen or fabricated identities -- represents an innovative approach to both revenue generation and potential insider access. The FBI estimates thousands of North Korean IT workers are employed at companies worldwide.

North Korean actors are notable for their operational versatility: the same organizational umbrella conducts financial crime (cryptocurrency theft, SWIFT fraud), espionage (defense sector, nuclear programs), destructive attacks (Sony Pictures, 2014), and supply chain compromises -- often simultaneously.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
Lazarus Group HIDDEN COBRA, Diamond Sleet, Zinc, Labyrinth Chollima, APT38 (overlap), TAG-71, Nickel Academy North Korea (RGB) Nation-State Revenue generation, espionage, destructive attacks Yes Cryptocurrency theft, custom malware families, social engineering of developers, supply chain attacks, SWIFT banking attacks North Korea
Kimsuky Emerald Sleet, Velvet Chollima, APT43, Thallium, Black Banshee, TA406, Springtail North Korea (RGB) Nation-State Intelligence collection, credential theft Yes Spear-phishing (think tank/academic impersonation), credential harvesting, ReconShark, BabyShark malware --
Andariel Onyx Sleet, Silent Chollima, Plutonium, DarkSeoul, Stonefly North Korea (RGB 3rd Bureau) Nation-State Espionage + ransomware revenue Yes Custom ransomware (Maui), EarlyRat, defense sector targeting, vulnerability exploitation --
BlueNoroff Sapphire Sleet, CryptoCore, TA444, COPERNICIUM North Korea (RGB) Nation-State Cryptocurrency and financial theft Yes Fake VC firms, social engineering via LinkedIn, cryptocurrency wallet compromise, macOS malware --
APT43 Kimsuky overlap, Jade Sleet, TraderTraitor North Korea (RGB) Nation-State Credential harvesting, crypto theft Yes Cryptocurrency theft to fund operations, fake personas, blockchain-related social engineering --
Citrine Sleet DEV-0139, AppleJeus overlap North Korea Nation-State Cryptocurrency targeting Yes Trojanized crypto trading apps, Chrome zero-days, blockchain targeting --
ScarCruft Ricochet Chollima, APT37, Reaper, Group123, Venus 121, InkySquid North Korea (MSS) Nation-State Espionage (South Korea, journalists, defectors) Yes Zero-day exploitation, RokRAT, watering holes, mobile targeting, Goldbackdoor --
TEMP.Hermit Lazarus subgroup, UNC577 North Korea Nation-State Espionage and destructive operations Yes AppleJeus, FALLCHILL, custom implants --
Moonstone Sleet Storm-1789 North Korea Nation-State Revenue + espionage via fake companies Yes Trojanized software, fake game companies, custom ransomware (FakePenny), IT worker schemes --
Ruby Sleet CERIUM North Korea Nation-State Defense and aerospace espionage Yes Spear-phishing, credential harvesting, defense contractor targeting --
IT Worker Scheme Various front companies (Yanbian Silverstar, Volasys Silver Star) North Korea Nation-State Revenue generation via fraud Yes Fake identities, remote IT employment, salary collection, insider access abuse, AI-generated profiles --

Iran

Iran's cyber capabilities have matured significantly since the Stuxnet era, with operations split between the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS). Iranian actors are distinguished by their willingness to conduct destructive operations (wipers, ICS attacks) and their increasing integration of influence operations with cyber intrusions -- a pattern Mandiant calls "hack-and-leak." The Israel-Hamas conflict (October 2023 onward) has significantly intensified Iranian cyber operations, with both IRGC and MOIS-linked groups increasing their tempo of attacks against Israeli, American, and Gulf state targets.

Iranian groups are generally assessed as less technically sophisticated than their Chinese and Russian counterparts, but they compensate with operational aggressiveness and a willingness to accept risk of attribution. Several Iranian groups have demonstrated the ability to conduct destructive operations against operational technology (OT) targets -- CyberAv3ngers' targeting of Unitronics PLCs at water utilities in late 2023 being a prominent example.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
APT33 Elfin, Peach Sandstorm, Refined Kitten, Magnallium, Holmium Iran (IRGC) Nation-State Espionage (aviation, energy, defense) Yes Password spraying, spear-phishing, Shamoon wiper (affiliated), custom backdoors --
APT35 Charming Kitten, Mint Sandstorm, Phosphorus, TA453, Ajax Security, ITG18, Yellow Garuda Iran (IRGC-IO) Nation-State Espionage, dissidents, think tanks, academia Yes Spear-phishing (impersonation of journalists/academics), credential harvesting, mobile surveillance, BellaCiao, PowerLess --
MuddyWater Mercury, Mango Sandstorm, Static Kitten, Seedworm, TEMP.Zagros, Earth Vetala Iran (MOIS) Nation-State Espionage (Middle East, government) Yes Spear-phishing, PowGoop, DLL side-loading, legitimate remote admin tools (Atera, SimpleHelp), living-off-the-land --
APT42 Calanque, Charming Kitten subgroup, Mint Sandstorm subgroup Iran (IRGC-IO) Nation-State Credential theft, surveillance of dissidents Yes Highly targeted social engineering, NICECURL/TAMECAT backdoors, cloud credential harvesting --
OilRig APT34, Helix Kitten, Hazel Sandstorm, Crambus, Chrysene, Cobalt Gypsy, IRN2, Europium Iran (MOIS) Nation-State Espionage (government, telecom, energy) Yes DNS tunneling, web shells, custom backdoors (Karkoff, DNSpionage), supply chain, credential theft --
Moses Staff Marigold Sandstorm, Abraham's Ax (related) Iran Nation-State / Hacktivist Destructive operations against Israel Yes Volume encryption (DCSrv), data theft and leak, hack-and-leak, no ransom demand --
Agrius Pink Sandstorm, DEV-0227, BlackShadow Iran Nation-State Destructive attacks disguised as ransomware Yes Apostle wiper/ransomware, Fantasy wiper, web shell deployment, data destruction --
Cotton Sandstorm Neptunium, DEV-0198, Hazel Sandstorm (partial) Iran (IRGC affiliated) Nation-State / IO Influence operations, hack-and-leak Yes Hack-and-leak, propaganda, personas, Charlie Hebdo and election interference operations --
Tortoiseshell Crimson Sandstorm, Imperial Kitten, TA456, Yellow Liderc Iran (IRGC contractor) Nation-State Espionage and supply chain targeting Yes Watering holes, fake websites, supply chain compromise, social engineering of defense contractors --
Lyceum Hexane, Spirlin, Siamesekitten Iran Nation-State Telecom and ISP espionage (Middle East, Africa) Yes DNS tunneling, credential spraying, custom backdoors (DanBot, Shark/Milan) --
CopyKittens -- Iran Nation-State Espionage (Israel, Germany, academic) Low activity Matryoshka RAT, watering holes, macro-laden documents --
Scarred Manticore Storm-0861 Iran (MOIS) Nation-State Long-term espionage (Middle East) Yes LIONTAIL framework, IIS extensions, web shells, passive implants --
Plaid Rain Polonium, DEV-0147 Iran (MOIS-linked, Lebanon-based) Nation-State Espionage targeting Israel Yes Cloud service abuse (OneDrive, Dropbox for C2), custom implants, coordination with MuddyWater --
CyberAv3ngers Storm-0784 Iran (IRGC-CEC) Nation-State / Hacktivist Critical infrastructure disruption Yes PLC/HMI targeting (Unitronics), web defacement, OT/ICS attacks, Israel-linked infrastructure --

Ransomware Groups

The ransomware ecosystem has consolidated around the RaaS model, where developers maintain the encryption platform and affiliates conduct the actual intrusions. Law enforcement disruptions in 2023-2024 (Hive, LockBit, ALPHV/BlackCat) have fragmented but not eliminated the ecosystem -- affiliates simply migrate to the next available platform. The trend toward data exfiltration without encryption ("extortion-only") reflects both improved backup resilience among defenders and the realization that data theft alone generates sufficient leverage.

Ransomware Ecosystem Resilience

Despite Operation Cronos (LockBit takedown, Feb 2024), the ALPHV/BlackCat exit scam (Mar 2024), and multiple arrests, the ransomware ecosystem demonstrated remarkable resilience throughout 2024-2025. RansomHub rapidly absorbed displaced LockBit and ALPHV affiliates. New groups (Fog, INC Ransom, Hunters International) emerged to fill gaps. The fundamental economics remain favorable for attackers: median ransom payments continue to exceed $200K, the cost of launching a RaaS operation continues to decline, and the affiliate model distributes risk across many operators. Until the economic equation changes -- through either more effective disruption of cryptocurrency laundering, successful prosecution of affiliates at scale, or substantially improved defensive posture -- the ecosystem will continue to regenerate.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
LockBit LockBit 2.0/3.0/Green, Bitwise Spider, Storm-0396 Russia-nexus (RaaS) Cybercrime Ransomware-as-a-Service Disrupted (Feb 2024), attempting rebuild RaaS model, double extortion, StealBit exfil, broad affiliate network, bug bounty program Ransomware
ALPHV/BlackCat Noberus, Sphynx Spider Russia-nexus (RaaS) Cybercrime Ransomware-as-a-Service Disrupted (exit scam Mar 2024) Rust-based ransomware, triple extortion, SEC complaint tactic, cross-platform --
Cl0p TA505 (affiliated), Clop, Lace Tempest, FIN11 overlap Russia-nexus Cybercrime Data extortion (mass exploitation) Yes MOVEit, GoAnywhere, Accellion zero-day exploitation, mass file theft, no encryption variant --
RansomHub -- Multi-national (RaaS) Cybercrime Ransomware-as-a-Service Yes Former ALPHV/BlackCat affiliates, aggressive recruitment, 90/10 affiliate split --
Akira Storm-1567, Punk Spider Russia-nexus (RaaS) Cybercrime Ransomware + data theft Yes VPN exploitation (Cisco), double extortion, retro-themed leak site, Linux/VMware ESXi variants --
Black Basta Storm-0506, Cardinal Spider Russia-nexus (ex-Conti) Cybercrime Ransomware + data extortion Yes QakBot distribution, vishing, Teams-based social engineering, double extortion --
Royal/BlackSuit DEV-0569 Russia-nexus (ex-Conti) Cybercrime Ransomware Yes (as BlackSuit) Callback phishing, SEO poisoning, partial encryption for speed, rebranded from Royal --
Rhysida Vice Society overlap (assessed) Unknown Cybercrime Ransomware targeting healthcare/education Yes Double extortion, phishing, abuse of legitimate tools, healthcare and government targeting --
Play PlayCrypt, Balloonfly Unknown Cybercrime Ransomware Yes Exploitation of FortiOS and Exchange, custom tooling, intermittent encryption, no RaaS (closed group) --
Medusa MedusaLocker (distinct), Storm-1175 Unknown Cybercrime Ransomware (RaaS) Yes Double extortion, Telegram-based operations, time-based ransom negotiation --
BianLian -- Russia-nexus Cybercrime Data extortion (shifted from encryption) Yes Pivoted to exfiltration-only (no encryption), ProxyShell exploitation, Go-based tooling --
Vice Society DEV-0832, Vanilla Tempest overlap Unknown Cybercrime Ransomware targeting education Reduced Multiple ransomware families (not custom), education sector focus, overlap with Rhysida --
Hive -- Multi-national Cybercrime Ransomware (RaaS) Disrupted (FBI, Jan 2023) RaaS, healthcare targeting, affiliates migrated to other groups --
Conti Wizard Spider (overlap), Gold Ulrick, Ryuk successor Russia-nexus Cybercrime Ransomware (RaaS) Disbanded (2022) TrickBot integration, double extortion, healthcare targeting, fragmented into Black Basta/Royal/others --
REvil/Sodinokibi Pinchy Spider, Gold Southfield Russia-nexus Cybercrime Ransomware (RaaS) Disrupted (2022) Kaseya supply chain attack, high-profile extortion, affiliate model pioneer --
DarkSide Carbon Spider (overlap) Russia-nexus Cybercrime Ransomware (RaaS) Rebranded (BlackMatter, then dissolved) Colonial Pipeline attack, ESXi targeting, corporate-style operations --
Phobos 8Base (overlap assessed) Unknown Cybercrime Ransomware (RaaS) Yes Low-sophistication RaaS, targets SMBs, RDP exploitation, affordable entry point --
8Base Phobos-based (assessed) Unknown Cybercrime Ransomware + data extortion Yes Modified Phobos variant, double extortion, SMB targeting --
INC Ransom INC Unknown Cybercrime Ransomware Yes Citrix Bleed exploitation, spear-phishing, healthcare and government targets --
Hunters International Hive successor (code overlap) Unknown Cybercrime Data theft + ransomware Yes Acquired Hive codebase, focus on data exfiltration, broad targeting --
Fog -- Unknown Cybercrime Ransomware Yes Education and recreation sector targeting, rapid encryption, VPN exploitation --

Other Cybercrime

Beyond ransomware, the cybercrime ecosystem includes financially motivated groups that specialize in initial access brokerage, malware distribution, point-of-sale fraud, business email compromise, and other schemes. Many of these groups serve as the upstream supply chain for ransomware operators. The distinction between "ransomware groups" and "other cybercrime" is increasingly artificial -- groups like FIN7 have evolved from POS fraud to ransomware access provision, and Scattered Spider moved from SIM swapping to enterprise ransomware in under two years.

The Cybercrime Supply Chain

Modern cybercrime operates as a supply chain, not as isolated groups. Malware distributors (Emotet, QakBot, BumbleBee) deliver initial payloads via phishing. Initial access brokers package and resell the resulting network access on underground forums. Ransomware affiliates purchase access and deploy encryption/exfiltration tools. RaaS developers provide the ransomware platform and negotiation infrastructure. Money laundering services convert cryptocurrency ransoms to fiat currency. Disrupting any single link in this chain creates temporary disruption but does not collapse the ecosystem because each role can be filled by multiple competing providers.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
FIN7 Carbanak, Carbon Spider, ELBRUS, Sangria Tempest, ITG14 Russia-nexus Cybercrime Financial theft, now supporting ransomware Yes (evolved) Point-of-sale malware, social engineering, fake companies (Combi Security), now provides access for ransomware ops --
FIN8 Syssphinx, White Rabbit (affiliated) Unknown Cybercrime POS/financial theft Yes POS malware (BadHatch), memory scraping, evolved to ransomware deployment --
FIN11 TA505 (overlap), Lace Tempest, DEV-0950 Russia-nexus Cybercrime Data extortion, mass exploitation Yes Cl0p ransomware operator, Accellion/MOVEit/GoAnywhere exploitation, volume over precision --
FIN12 Pistol Tempest, DEV-0237 Russia-nexus Cybercrime Rapid ransomware deployment Yes Fast time-to-ransom (under 2 days), skip exfiltration, healthcare targeting, multiple ransomware brands --
Scattered Spider Octo Tempest, UNC3944, Star Fraud, Muddled Libra, 0ktapus Multi-national (English-speaking) Cybercrime Data theft, extortion, ransomware Yes SIM swapping, MFA fatigue, social engineering of help desks, Okta targeting, ALPHV affiliate, MGM/Caesars attacks --
TA505 Hive0065, GOLD TAHOE, FIN11 overlap Russia-nexus Cybercrime Malware distribution, access brokerage Yes Dridex, Locky, TrickBot distribution, massive phishing campaigns, now Cl0p affiliate --
TA577 -- Russia-nexus Cybercrime Initial access broker Yes QakBot distribution, Pikabot, high-volume phishing, thread hijacking --
Emotet Operators TA542, Mummy Spider, GOLD CRESTWOOD Russia/Ukraine nexus Cybercrime Malware-as-a-Service Intermittent (rebuilding post-takedown) Modular botnet, email thread hijacking, dropper for TrickBot/QakBot/Cobalt Strike --
Wizard Spider TrickBot, Conti, Gold Ulrick, ITG23, DEV-0193 Russia Cybercrime Ransomware ecosystem operator Fragmented TrickBot/BazarLoader, Conti ransomware, Cobalt Strike, splintered into multiple successor groups --
QakBot Operators TA570, Gold Lagoon Unknown Cybercrime Malware distribution / initial access Rebuilding (post-FBI takedown Aug 2023) QakBot botnet, email thread hijacking, DLL injection, dropper for ransomware --
BumbleBee Operators -- Unknown (ex-TrickBot linked) Cybercrime Malware loader / initial access Yes Successor to BazarLoader, ISO/VHD delivery, Google Ads malvertising, enterprise targeting --
Lapsus$ DEV-0537, Strawberry Tempest Multi-national (UK teens) Cybercrime Data theft, extortion, notoriety Reduced (arrests) SIM swapping, MFA fatigue, insider recruitment, source code theft (Microsoft, NVIDIA, Okta, Samsung) --
IABs (General) Multiple individual operators Various Cybercrime Sell network access Yes Exploit public-facing apps, credential stuffing, RDP brute force, sell on forums (Exploit, XSS, RAMP) --

Hacktivism and Influence Operations

The hacktivist landscape has been transformed by geopolitical conflict. The Russia-Ukraine war and the Israel-Hamas war have created two distinct ecosystems of politically motivated cyber activity, many of which are either directly controlled by or loosely affiliated with state intelligence services.

Group Name Aliases Origin Category Primary Objective Active? Key TTPs Deep-Dive
Anonymous -- Decentralized Hacktivist Anti-establishment, various causes Intermittent DDoS, data leaks, website defacement, decentralized coordination --
IT Army of Ukraine -- Ukraine Hacktivist (state-encouraged) DDoS and disruption of Russian targets Yes Crowdsourced DDoS, target coordination via Telegram, attack tooling distribution --
KillNet KillMilk Russia Hacktivist (state-aligned) DDoS against NATO/Western targets Reduced (fragmented) Low-sophistication DDoS, propaganda-focused, exaggerated impact claims --
NoName057(16) -- Russia Hacktivist (state-aligned) DDoS against NATO/Ukraine-supporting nations Yes DDoSia tool (crowdsourced), website DDoS, government and transport targeting --
Anonymous Sudan Storm-1359 Sudan/Russia (debated attribution) Hacktivist / State-proxy DDoS against Western targets Disrupted (arrests, Oct 2024) Application-layer DDoS, Microsoft/Cloudflare targeting, DDoS-for-hire, likely Russian ties --
CyberAv3ngers See Iran section Iran (IRGC-CEC) Hacktivist / Nation-State Anti-Israel critical infrastructure attacks Yes PLC exploitation (Unitronics), water utility targeting, ICS/OT attacks --
SiegedSec -- Multi-national Hacktivist Data leaks, anti-government Dissolved (2024) SQL injection, data theft and public leaks, targeted NATO and state government systems --
GhostSec -- Multi-national Hacktivist Anti-authoritarian, ICS targeting Active (evolved) RTU/PLC scanning, data leaks, briefly pivoted to ransomware, collaboration with Stormous --

State-Proxy Hacktivism

A critical distinction must be drawn between genuine hacktivism (decentralized, ideologically motivated, typically low-sophistication) and state-proxy hacktivism (directed or tolerated by intelligence services, using hacktivist branding for plausible deniability). Groups like KillNet, NoName057(16), and Anonymous Sudan fall into the latter category. Their operational coordination with known state actors (documented by multiple vendors), timing aligned with geopolitical events, and access to infrastructure inconsistent with volunteer operations all point to state involvement. For defenders, the distinction matters because state-proxy hacktivists may escalate to more destructive operations when directed to do so, while genuine hacktivists typically remain at the DDoS/defacement level.


Emerging: AI-Augmented Threat Actors

While not a distinct group, the use of AI by existing threat actors is reshaping the landscape and deserves specific attention. As of early 2026, AI augmentation has moved beyond the experimental stage into routine operational use by both nation-state and cybercriminal actors.

Observed AI-Augmented Activity (2024-2026)

  • APT28 and APT29 have used LLMs for scripting, reconnaissance research, and social engineering refinement (Microsoft/OpenAI, Feb 2024)
  • Kimsuky and Emerald Sleet used LLMs for target research and phishing content generation
  • Crimson Sandstorm (Iran) used LLMs for social engineering and code debugging
  • Cybercriminals are leveraging AI for deepfake voice/video in BEC attacks, automated phishing at scale, polymorphic malware generation, and vulnerability research acceleration
  • FraudGPT/WormGPT represented early attempts at uncensored criminal AI tools, though their impact has been overstated relative to jailbreaks of mainstream models
  • Vishing at scale has become a documented trend, with AI-generated voice calls used in social engineering campaigns against IT help desks (Scattered Spider pattern, now widely adopted)
AI Capability Impact on Threat Actors Timeline Defensive Segments Affected
Phishing content generation Higher quality, multi-language, fewer indicators Now (widespread) Email Security, Security Awareness
Deepfake voice/video BEC and social engineering amplification Now (growing) Identity, Security Awareness
Automated reconnaissance Faster target profiling and OSINT Now Threat Intel, Vuln/ASM
Automated vulnerability research Faster zero-day discovery and exploit development Emerging (2025+) Vuln/ASM, AppSec, Endpoint
Polymorphic malware Signature evasion at scale Emerging Endpoint, Network
Autonomous attack chaining Multi-step attacks without human guidance Anticipated (2026+) All segments

Implications for Defenders

The AI augmentation of threat actors has several concrete implications for cybersecurity product strategy:

  • Email security must evolve beyond static indicators. AI-generated phishing eliminates the grammatical errors, awkward phrasing, and template patterns that traditional detections rely on. Behavioral analysis (sender reputation, communication graph anomalies, intent analysis) becomes the primary detection layer.
  • Security awareness training faces an existential challenge. If AI can generate perfect phishing emails customized to each recipient, click-rate-based training metrics become meaningless. The field must shift toward reporting culture and organizational resilience rather than individual phishing simulation pass rates.
  • Identity verification needs out-of-band confirmation for high-risk transactions. Deepfake voice and video mean that a phone call or video conference is no longer sufficient to verify identity for actions like wire transfers, credential resets, or access grants.
  • Endpoint and network security vendors must assume that malware will increasingly evade static signatures. Behavioral detection, memory forensics, and anomaly-based approaches gain further importance.
  • Threat intelligence platforms must track not just which actors use AI, but how AI changes their operational tempo and targeting patterns. Faster reconnaissance and exploit development means shorter windows between vulnerability disclosure and mass exploitation.

Market Implications by Actor Category

Understanding which threat actors drive which market segments is essential for product strategy and investment analysis. The following summarizes the primary market implications of each actor category.

How Threat Actors Shape Market Demand

Every major cybersecurity product category exists because of a specific threat actor behavior. EDR exists because of advanced persistent threats. Email security exists because of phishing. Identity security exists because of credential theft. Understanding the actor-to-segment mapping helps predict where demand will grow as actor TTPs evolve.

Nation-state actors (China, Russia, North Korea, Iran):

  • Drive demand for threat intelligence platforms -- organizations need attribution context, IOC feeds, and campaign tracking to understand whether they are targeted by state actors
  • Create the business case for network detection and response (NDR) and OT/IoT security -- ICS/SCADA targeting by Sandworm, CyberAv3ngers, and Volt Typhoon makes industrial security a board-level concern
  • Validate Zero Trust architecture investments -- living-off-the-land techniques used by Volt Typhoon and APT29 bypass perimeter-based defenses entirely
  • Justify cloud security spending -- APT29's exploitation of OAuth tokens, Azure AD, and cloud services demonstrates that cloud environments are primary targets, not safe havens

Ransomware and cybercrime actors:

  • Represent the single largest driver of endpoint security (EDR/XDR) spending -- ransomware is the threat that CISOs lose sleep over and boards fund against
  • Fuel the MDR/MSSP market -- organizations that cannot staff 24/7 SOCs turn to managed services specifically because of ransomware risk
  • Drive data security and backup investments -- the shift to double extortion (encrypt + exfiltrate) means that backups alone are no longer sufficient
  • Create demand for email security -- phishing remains the dominant initial access vector for ransomware affiliates
  • Expand the cyber insurance market, which in turn imposes security requirements that drive product adoption across multiple segments

Hacktivists and influence operators:

  • Drive DDoS mitigation and web application firewall (WAF) demand -- DDoS remains the primary hacktivist tool
  • Create awareness (if not always budget) for security awareness training and influence operation detection
  • The state-proxy hacktivist trend validates investment in threat intelligence that can distinguish genuine grassroots hacktivism from state-directed operations

Insider threats:

  • Drive the data loss prevention (DLP) and data security posture management (DSPM) markets
  • Justify identity governance and administration (IGA) and privileged access management (PAM) investments
  • Create demand for user and entity behavior analytics (UEBA) -- detecting anomalous access patterns is the primary technical control against malicious insiders

Deep-Dive Pages

The following individual threat actor deep-dives are available or planned. Each deep-dive includes detailed TTP analysis mapped to MITRE ATT&CK, campaign timelines, notable incidents, defensive recommendations, and market impact assessment.

Available

Actor Page Category Priority Rationale
Volt Typhoon China China / Nation-State Highest-impact critical infrastructure threat; directly drives OT/IoT, Network, and ZTNA market demand
Salt Typhoon China China / Nation-State Telecom infrastructure compromise with strategic implications; drives telecom security and lawful intercept market
APT41 China China / Dual-purpose Unique dual espionage-cybercrime mission; demonstrates state-criminal convergence trend
APT29 Russia Russia / Nation-State SolarWinds and ongoing cloud-focused operations; primary driver of supply chain and cloud security demand
APT28 Russia Russia / Nation-State Election interference, edge device exploitation; drives email security and edge/VPN security demand
Sandworm Russia Russia / Nation-State Most destructive cyber actor (NotPetya, Industroyer); primary driver of OT/ICS security market
Lazarus Group North Korea North Korea / Nation-State Largest cryptocurrency theft operation; drives cryptocurrency security and financial sector demand
LockBit Ransomware Ransomware / Cybercrime Most prolific ransomware operation (pre-disruption); case study in RaaS model and law enforcement disruption

Planned

Deep-dive pages for the following actors are planned, prioritized by market impact:

  • Scattered Spider / Octo Tempest -- Social engineering innovation, identity attack vectors
  • Cl0p -- Mass exploitation model, file transfer platform targeting
  • Kimsuky / APT43 -- Credential theft ecosystem, IT worker fraud scheme
  • Turla / Secret Blizzard -- Advanced tradecraft, infrastructure hijacking
  • APT35 / Charming Kitten -- Social engineering sophistication, mobile surveillance
  • Black Basta -- Post-Conti ecosystem evolution
  • RansomHub -- Post-disruption ecosystem reformation

Cross-References

Related Sections

  • Threat Landscape Overview -- Macro-level analysis of breach trends, financial impact, and the structural reasons why defenses fail
  • Threat Intelligence Segment -- Market analysis of TIP platforms, dark web monitoring vendors, and the threat intel ecosystem
  • Pain Points & Friction -- Cross-segment analysis of defender challenges, including alert fatigue and tool sprawl that threat actors exploit
  • OT/IoT Security -- Critical infrastructure defense against nation-state actors (Volt Typhoon, Sandworm, CyberAv3ngers)
  • Identity & Access -- Identity-based attack vectors exploited by nearly every threat actor category
  • Endpoint Security -- EDR/XDR platforms that form the primary detection layer against most threat actors
  • Email Security -- Phishing defense, the initial access vector for the majority of threat actors listed above

Sources

This catalog draws from the following primary sources. Individual group entries reference specific reports in their deep-dive pages.

  • MITRE ATT&CK -- Groups knowledge base and technique mappings
  • CISA -- Advisories, alerts, and joint cybersecurity bulletins (especially Joint CSAs with FBI, NSA)
  • Microsoft Threat Intelligence -- Threat actor profiles, naming taxonomy, blog publications
  • Mandiant/Google Threat Intelligence -- M-Trends annual reports, APT research, UNC tracking
  • CrowdStrike -- Annual Global Threat Reports, adversary profiles
  • Recorded Future -- Insikt Group research, threat actor TAG tracking
  • Dragos -- ICS/OT-specific threat group analysis (annual Year in Review reports)
  • Secureworks -- Counter Threat Unit (CTU) research and State of the Threat reports
  • Unit 42 (Palo Alto Networks) -- Threat actor and campaign reports
  • ESET -- APT activity reports, threat research blog
  • Kaspersky GReAT -- APT research and reporting
  • The DFIR Report -- Community-driven intrusion analysis with detailed TTP documentation
  • Cisco Talos -- Threat research, vulnerability intelligence, and campaign tracking
  • Check Point Research -- Threat intelligence publications and campaign analysis
  • Sophos X-Ops -- Active adversary reports and ransomware ecosystem analysis
  • ENISA -- EU Agency for Cybersecurity threat landscape reports

Key Annual Reports

The following recurring publications are particularly valuable for tracking threat actor evolution year-over-year:

Report Publisher Frequency Focus
Global Threat Report CrowdStrike Annual (Feb) Adversary trends, eCrime ecosystem, nation-state activity
M-Trends Mandiant/Google Annual (Apr) Incident response data, dwell time metrics, APT campaigns
Threat Intelligence Index IBM X-Force Annual (Feb) Attack vectors, industry targeting, geographic trends
Digital Defense Report Microsoft Annual (Oct) Nation-state activity, cybercrime trends, AI threats
Data Breach Investigations Report (DBIR) Verizon Annual (May) Incident patterns, actor motives, breach demographics
Year in Review Dragos Annual (Feb) ICS/OT threat landscape, activity group updates
State of the Threat Secureworks Annual (Oct) CTU research findings, threat actor evolution
Internet Crime Report FBI IC3 Annual Reported cybercrime losses, BEC trends, ransomware complaints

Maintenance

The threat actor landscape evolves continuously. This catalog reflects known activity and attributions as of early 2026. Groups may rebrand, merge, splinter, or go dormant. New aliases are assigned as vendors update their taxonomies. Deep-dive pages for individual actors will be added progressively -- priority is given to actors with the highest current impact on cybersecurity product demand and market dynamics.

Attribution Caveats

All attributions in this catalog reflect the assessed consensus of the cited sources. Cyber attribution is inherently uncertain -- it relies on technical indicators, operational patterns, victimology, and intelligence sources that may be incomplete or deliberately misleading (false flag operations are documented, notably by Sandworm). "Assessed" means the weight of available evidence supports the attribution but absolute certainty is rarely achievable. Where attribution is contested or uncertain, this is noted in the relevant entry.

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles