Threat Actors¶
Section Overview
Comprehensive catalog of cyber threat actors -- nation-state, cybercrime, and emerging adversaries -- with analysis of their techniques, capabilities, and implications for the cybersecurity product market.
Threat Actors¶
Comprehensive catalog of cyber threat actors --- nation-state, cybercrime, and emerging adversaries --- with analysis of their techniques, capabilities, and market implications.
This section provides a structured reference for the adversaries driving demand across every cybersecurity market segment. Understanding who is attacking, how they operate, and what they target is essential context for evaluating defensive products, identifying underserved market gaps, and anticipating where the next wave of security spending will flow.
The threat actor landscape has become more complex, more interconnected, and more commercially driven than at any point in the history of cybersecurity. The traditional boundaries between nation-state espionage, organized cybercrime, and ideological hacktivism have eroded to the point where attribution itself has become one of the hardest problems in the field. A single intrusion may involve a nation-state sponsor, a criminal initial access broker, a ransomware-as-a-service platform, and a hacktivist front -- all operating within the same kill chain.
This catalog attempts to impose structure on that complexity. Each group is listed with all known aliases across major vendor taxonomies, its assessed origin and objectives, current activity status, and a summary of key tactics, techniques, and procedures (TTPs). Where deep-dive analysis pages exist, they are linked directly.
How to Use This Page¶
This index serves multiple audiences:
- Product teams and builders should use the Category Comparison and Market Implications sections to understand which threat actors create demand for which product categories. If you are building an OT/ICS security product, the China and Russia sections -- particularly Volt Typhoon, Sandworm, and CyberAv3ngers -- define your threat model.
- Investors and analysts should focus on the Convergence Trends and Market Implications sections to understand how threat actor evolution drives market growth. The ransomware ecosystem's resilience despite law enforcement takedowns, for example, signals sustained demand for EDR, MDR, and data security products.
- Security practitioners and CISOs should use the Master Threat Actor Table as a lookup reference when consuming threat intelligence from multiple vendor sources. The Vendor Naming Conventions section helps resolve the alias problem that plagues multi-vendor environments.
- Threat intelligence analysts should use the deep-dive links to access detailed per-actor analysis, including MITRE ATT&CK mappings, campaign timelines, and IOC references.
Threat Actor Taxonomy¶
The following diagram illustrates the major categories of threat actors and the operational relationships between them. These boundaries are increasingly blurred: nation-states outsource to cybercriminals, ransomware groups adopt state-level TTPs, and hacktivists serve as proxies for intelligence agencies.
Key observations from the taxonomy:
- Nation-state actors sit at the top of the sophistication pyramid but increasingly rely on criminal infrastructure (initial access brokers, commodity malware, bulletproof hosting) to maintain operational tempo and complicate attribution.
- Cybercrime has fully industrialized. The ransomware-as-a-service (RaaS) model means that the developer, the affiliate who deploys the ransomware, and the initial access broker who sold the foothold may all be different entities with no direct organizational relationship.
- Ideological actors (hacktivists) have been revitalized by the Russia-Ukraine conflict and the Israel-Hamas war, but many "hacktivist" groups are state-directed or state-tolerated proxies rather than independent movements.
- Insider threats remain the most difficult category to address with technology alone, requiring a combination of identity controls, data security, and organizational culture.
- AI-augmented threats are not yet a separate category of actor but are amplifying the capabilities of every existing category, lowering the barrier to entry for less sophisticated groups.
Convergence Trends¶
Several structural shifts are reshaping how these categories interact:
-
State-criminal convergence. North Korea's Lazarus Group operates ransomware to fund the regime. Russian intelligence services tolerate (and occasionally task) cybercriminal groups like Evil Corp. Iran-linked actors deploy wipers disguised as ransomware. The line between "state actor" and "criminal" is increasingly a policy fiction.
-
The initial access broker economy. IABs have created a liquid market for network access, decoupling the "break-in" phase from the "exploit" phase. A single compromised VPN credential sold on a dark web forum may be purchased by a ransomware affiliate, a nation-state proxy, or both. This commoditization of access means that even sophisticated actors may begin their operations with tools and accesses that look identical to commodity crime.
-
Hacktivist laundering. State intelligence services increasingly use hacktivist personas to conduct operations that would be diplomatically costly if attributed to government agencies. The GRU's use of XakNet and similar fronts, and Iran's use of CyberAv3ngers, exemplify this pattern. The operational security is often deliberately poor -- the goal is plausible deniability, not genuine anonymity.
-
Ransomware ecosystem fragmentation and reformation. Law enforcement takedowns (Hive in January 2023, LockBit in February 2024, ALPHV/BlackCat exit scam in March 2024) disrupt but do not destroy the ecosystem. Affiliates, developers, and operators reform under new brands within weeks. The technical barriers to launching a new RaaS have never been lower.
-
Supply chain as the preferred vector. Across all actor categories, the trend toward supply chain compromise -- whether targeting MSPs (APT10), software vendors (APT29/SolarWinds), or file transfer platforms (Cl0p/MOVEit) -- reflects a rational optimization: compromise one supplier, gain access to thousands of downstream targets.
Category Comparison¶
| Category | Primary Objective | Sophistication | Resources | Typical Targets | Dwell Time | Key Segments Impacted |
|---|---|---|---|---|---|---|
| China (Nation-State) | Espionage, IP theft, pre-positioning | Very High | State-funded, large teams | Government, defense, telecom, tech, critical infrastructure | Months to years | Endpoint, Network, Cloud, Threat Intel, OT/IoT |
| Russia (Nation-State) | Espionage, disruption, geopolitical influence | Very High | State-funded (GRU, SVR, FSB) | Government, energy, elections, NATO members | Weeks to years | Endpoint, Network, Email, OT/IoT, Identity |
| North Korea (Nation-State) | Revenue generation, espionage | High | State-funded (RGB) | Cryptocurrency, financial institutions, defense, media | Weeks to months | Endpoint, Identity, Cloud, Data Security |
| Iran (Nation-State) | Disruption, espionage, regional influence | Moderate-High | State-funded (IRGC, MOIS) | Energy, government, dissidents, Israel/Gulf states | Days to months | OT/IoT, Email, Network, Identity |
| Ransomware | Financial extortion | Moderate-High | Self-funded (RaaS profits) | Healthcare, education, manufacturing, SMBs | Hours to days | Endpoint, Network, Data, MDR/MSSP, Email |
| Initial Access Brokers | Sell network access | Moderate | Independent operators | Any organization with resale value | Minutes to days | Identity, Vuln/ASM, Email |
| Cybercrime Markets | Enable crime-as-a-service | Varies | Underground economy | Infrastructure providers, enablers | N/A (infrastructure) | Threat Intel, Email, Identity |
| Hacktivism | Disruption, publicity, ideology | Low-Moderate | Volunteer / state-proxied | Government, corporations, perceived adversaries | Minutes to hours | Network (DDoS), AppSec, Cloud |
| Influence Operations | Narrative manipulation | Moderate | State or political funding | Public opinion, elections, social media | Persistent | Email, Security Awareness |
| Insider Threats | Varies (financial, ideological, negligence) | Low-High | Privileged access | Employer organization | Ongoing | Data Security, Identity, GRC |
| AI-Augmented | Amplify existing objectives | Rapidly increasing | Accessible AI tooling | Broadening target surface | Decreasing (faster ops) | Email, AppSec, Identity, Security Awareness |
Reading the Table
"Key Segments Impacted" refers to the cybersecurity market segments (as defined in the Segments Overview) where each actor category drives the most demand. A ransomware wave that hits healthcare, for example, drives spending in Endpoint, MDR/MSSP, Data Security, and Email Security simultaneously.
Actor Sophistication Spectrum¶
The sophistication spectrum is not static -- it shifts as tools and techniques proliferate downward from advanced actors to commodity criminals:
- Tier 1 (Very High): Custom zero-day development, supply chain implants, firmware-level persistence, satellite C2 hijacking, living-off-the-land at scale. Examples: Volt Typhoon, APT29, Sandworm, Turla.
- Tier 2 (High): Exploitation of known vulnerabilities within days of disclosure, custom malware families, advanced social engineering, multi-stage intrusion chains. Examples: APT41, Lazarus, APT28, Cl0p.
- Tier 3 (Moderate): Use of commodity tools (Cobalt Strike, Metasploit), purchased exploits, off-the-shelf RATs, established RaaS platforms. Examples: Most ransomware affiliates, FIN12, Scattered Spider.
- Tier 4 (Low): DDoS-for-hire, defacement tools, public exploit scripts, phishing kits purchased from underground markets. Examples: Most hacktivist groups, low-tier IABs, script-based actors.
A critical dynamic: techniques that were Tier 1 two years ago are often Tier 3 today. Living-off-the-land techniques pioneered by advanced Chinese actors are now used by ransomware affiliates. OAuth and cloud token abuse demonstrated by APT29 is now a standard part of the cybercrime playbook. AI-augmented phishing, once hypothetical, is now accessible to anyone with access to an LLM. This downward diffusion of techniques is a primary driver of the expanding attack surface that cybersecurity vendors must address.
Vendor Naming Conventions¶
Different threat intelligence vendors assign their own names to the same actor groups, creating significant confusion. A single group like APT28 may appear as "Fancy Bear" in CrowdStrike reporting, "Forest Blizzard" in Microsoft advisories, "Sofacy" in Kaspersky research, and "Iron Twilight" in Secureworks analysis. This reference table maps the major naming schemes.
Understanding the Naming Problem¶
The proliferation of naming conventions is not merely an inconvenience -- it actively hinders threat intelligence sharing and operational coordination. When a CISO receives alerts referencing "Midnight Blizzard" from Microsoft Defender, "Cozy Bear" from CrowdStrike Falcon, and "APT29" from Mandiant, correlating these as the same actor requires either deep expertise or a lookup table. This fragmentation has spawned an entire sub-industry of threat intelligence platforms focused on entity resolution and alias mapping.
The table below maps naming conventions across the ten most widely referenced threat intelligence vendors.
Naming Scheme by Vendor¶
| Vendor | Naming Convention | China | Russia | North Korea | Iran | Cybercrime | Unknown/Emerging |
|---|---|---|---|---|---|---|---|
| CrowdStrike | Animals | Panda | Bear | Chollima | Kitten | Spider | Jackal, Hawk, Lynx |
| Microsoft | Weather | Typhoon | Blizzard | Sleet | Sandstorm | Tempest / Storm | Storm-XXXX (dev designations) |
| Mandiant / Google | APT/FIN/UNC numbers | APT1, 10, 15, 27, 30, 31, 40, 41 | APT28, 29 | APT37, 38, 43 | APT33, 34, 35, 42 | FIN4-13 | UNC groups |
| Dragos | Minerals/Elements (ICS-focused) | Voltzite, Vanadinite | Electrum, Kamacite, Stibnite | Covellite | Magnallium, Parisite | Wassonite | various |
| Secureworks | Color + element | Bronze (China) | Iron (Russia) | Nickel (NK) | Cobalt (Iran) | Gold (crime) | Tin, Silver (other) |
| Kaspersky | Descriptive names | various | Sofacy, Turla, Dukes | Lazarus, Kimsuky | OilRig, Shamoon | various | -- |
| ESET | Descriptive / themed | SpadeAce, Winnti | Sednit, Sandworm, Gamaredon | Lazarus, Kimsuky | Agrius, OilRig | various | -- |
| Palo Alto (Unit 42) | Constellation-themed | various | Cloaked Ursa, Fighting Ursa | various | Spectral Kitten | various | -- |
| Recorded Future | TAG-XX format | TAG-22, TAG-74 | TAG-70, TAG-110 | TAG-71 | TAG-56 | various | -- |
| Proofpoint | TA-XXXX format | TA413, TA416 | TA422, TA473 | TA406, TA444 | TA450, TA453, TA455, TA456 | TA505, TA542, TA570, TA577 | -- |
Navigating the Alias Problem
The Master Threat Actor Table below includes all major aliases for each group. When researching a specific actor, use the alias columns to cross-reference across vendor reports. Microsoft's weather-based taxonomy (introduced April 2023) is increasingly adopted as a de facto standard due to Microsoft Threat Intelligence's broad telemetry and the systematic, predictable naming structure. CrowdStrike's animal-based names remain dominant in incident response contexts. MITRE ATT&CK group pages serve as the closest thing to a neutral, consensus reference.
Master Threat Actor Table¶
This catalog organizes all major known threat actor groups by origin and category. The Deep-Dive column links to detailed analysis pages where available. Groups are listed roughly in order of current assessed activity level and impact within each category.
Table Column Guide
- Group Name: The most commonly used name in current reporting (preference given to the name used by the vendor that tracks the group most closely)
- Aliases: All known names from major vendors. This is critical for cross-referencing vendor reports
- Origin: Assessed country of origin and, where known, the specific government agency or organizational affiliation
- Category: Nation-State, Cybercrime, Hacktivist, or hybrid designations for actors that span categories
- Primary Objective: The assessed strategic goal -- espionage, financial gain, disruption, or a combination
- Active?: Current operational status: Yes (active in 2025-2026), Low activity, Dormant, Disrupted (by law enforcement), or Disbanded
- Key TTPs: Summary of the most distinctive tactics, techniques, and procedures. Deep-dive pages contain full MITRE ATT&CK mappings
- Deep-Dive: Link to detailed analysis page, or "--" if not yet available
China¶
China-linked actors represent the largest and most diverse nation-state cyber program, with an estimated dozens of distinct operational teams under multiple government and military organizations. Operations span from strategic pre-positioning in critical infrastructure (Volt Typhoon) to mass espionage campaigns targeting intellectual property, government secrets, and telecom infrastructure. Many groups are assessed to operate under the Ministry of State Security (MSS), the People's Liberation Army Strategic Support Force (PLA SSF), or contracted civilian entities that provide offensive capabilities on a quasi-commercial basis.
The 2024-2025 period saw two watershed developments in China-attributed operations:
- Volt Typhoon represented a strategic shift from espionage to pre-positioning -- maintaining persistent access in U.S. critical infrastructure (water, energy, transportation, communications) without conducting any data exfiltration, strongly suggesting preparation for potential destructive or disruptive operations during a future conflict. CISA Director Easterly described this as China "burrowing in" to critical infrastructure.
- Salt Typhoon compromised at least nine U.S. telecommunications providers, gaining access to lawful intercept systems (wiretap infrastructure) and the communications metadata of senior U.S. government officials. This was described by Senator Warner as "the worst telecom hack in our nation's history."
These operations, combined with the sheer breadth of Chinese cyber activity (25+ distinct tracked groups), make China the most significant nation-state cyber threat by volume and scope.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| Volt Typhoon | Vanguard Panda, Bronze Silhouette, Voltzite, DEV-0391 | China (PRC) | Nation-State | Pre-positioning in critical infrastructure | Yes | Living-off-the-land (LOTL), SOHO router botnets, no malware deployment, credential harvesting | China |
| Salt Typhoon | GhostEmperor, FamousSparrow | China (PRC) | Nation-State | Telecom espionage, lawful intercept compromise | Yes | Router implants, telecom infrastructure exploitation, wiretap system access | China |
| APT41 | Winnti, Wicked Panda, Barium, Double Dragon, Bronze Atlas, TG-2633 | China (PRC) | Nation-State / Cybercrime | Espionage + financial crime (dual mission) | Yes | Supply chain attacks, rootkits, game industry targeting, SQL injection, custom backdoors | China |
| APT10 | Stone Panda, MenuPass, Red Apollo, CVNX, Bronze Riverside, POTASSIUM | China (PRC) | Nation-State | Espionage, MSP targeting | Yes | Cloud Hopper campaign, MSP compromise, spear-phishing, DLL side-loading | -- |
| APT31 | Zirconium, Violet Typhoon, Judgment Panda, Bronze Vinewood | China (PRC) | Nation-State | Political espionage, IP theft | Yes | Router exploitation, SOHO device botnets, spear-phishing, zero-days | -- |
| APT3 | Gothic Panda, Buckeye, UPS Team, TG-0110, Pirpi | China (PRC) | Nation-State | Defense and technology espionage | Dormant | Browser zero-days, custom RATs, lateral movement via Windows exploits | -- |
| APT17 | Deputy Dog, Axiom, Aurora Panda, Elderwood | China (PRC) | Nation-State | Technology and defense espionage | Low activity | Watering hole attacks, zero-day exploits, TechNet abuse for C2 | -- |
| Mustang Panda | Bronze President, RedDelta, TA416, Earth Preta, Stately Taurus, Camaro Dragon | China (PRC) | Nation-State | Geopolitical espionage (SE Asia, Europe) | Yes | USB-propagated malware, PlugX/Korplug, spear-phishing with lure documents | -- |
| Aquatic Panda | Earth Lusca (partial overlap), RedHotel (partial overlap) | China (PRC) | Nation-State | Espionage + opportunistic intrusion | Yes | Log4Shell exploitation, Cobalt Strike, credential harvesting, web exploitation | -- |
| Hafnium | Silk Typhoon | China (PRC) | Nation-State | Espionage via zero-day exploitation | Yes | Exchange Server zero-days (ProxyLogon), web shells, cloud token theft | -- |
| APT27 | Emissary Panda, Iron Tiger, Lucky Mouse, Bronze Union, TG-3390 | China (PRC) | Nation-State | Espionage, opportunistic ransomware | Yes | SysUpdate backdoor, HyperBro RAT, SharePoint exploitation, China Chopper web shell | -- |
| APT15 | Vixen Panda, Ke3chang, Nickel, Bronze Palace, Playful Dragon | China (PRC) | Nation-State | Diplomatic and government espionage | Yes | Custom backdoors (Ketrum, Okrum), VPN exploitation, long-term persistent access | -- |
| APT40 | Leviathan, Kryptonite Panda, Gingham Typhoon, Bronze Mohawk, TEMP.Periscope | China (PRC) | Nation-State | Maritime, defense, and regional espionage | Yes | Spear-phishing, web compromise, SOHO device exploitation, ScanBox framework | -- |
| Naikon | APT30, Override Panda, Lotus Panda | China (PRC) | Nation-State | Southeast Asian government espionage | Yes | Aria-body RAT, DLL hijacking, long-term access to government networks | -- |
| Gallium | Granite Typhoon, GALLIUM, Alloy Taurus | China (PRC) | Nation-State | Telecom and financial espionage | Yes | PingPull RAT, SoftEther VPN abuse, web shell deployment, living-off-the-land | -- |
| Blackfly | APT41 subgroup, Grayfly | China (PRC) | Nation-State | Espionage targeting Asia | Yes | ShadowPad, Winnti backdoor, supply chain compromise | -- |
| Earth Lusca | TAG-22, Charcoal Typhoon (partial) | China (PRC) | Nation-State | Espionage + financial crime | Yes | Cobalt Strike, ShadowPad, vulnerability exploitation, watering holes | -- |
| LightBasin | UNC1945 | China (assessed) | Nation-State | Telecom infrastructure espionage | Yes | Custom Linux/Solaris implants, telecom protocol exploitation, GPRS tunneling | -- |
| RedHotel | TAG-22 (partial), Charcoal Typhoon (partial), Aquatic Panda (partial) | China (PRC) | Nation-State | Espionage across government and tech | Yes | ShadowPad, Winnti, Cobalt Strike, broad targeting across sectors | -- |
| BackdoorDiplomacy | TA413, Stately Taurus (partial) | China (PRC) | Nation-State | Diplomatic espionage (Africa, Middle East) | Yes | Quarian backdoor, Turian backdoor, exploitation of internet-facing devices | -- |
| Flax Typhoon | Ethereal Panda | China (PRC) | Nation-State | Persistent access, IoT botnet operations | Yes | LOTL techniques, IoT device compromise (Raptor Train botnet), minimal malware | -- |
| Charcoal Typhoon | Chromium, ControlX | China (PRC) | Nation-State | Espionage targeting government and tech | Yes | Cobalt Strike, exploitation of public-facing apps, credential harvesting | -- |
| Raspberry Typhoon | Radium, APT30 overlap | China (PRC) | Nation-State | SE Asian government espionage | Yes | Spear-phishing, custom implants, long-term access operations | -- |
| APT5 | Keyhole Panda, Manganese, Bronze Fleetwood | China (PRC) | Nation-State | Telecom and tech espionage | Yes | Pulse Secure VPN zero-days, custom backdoors, network appliance targeting | -- |
| Periscope | TEMP.Periscope, APT40 subgroup, Leviathan overlap | China (PRC) | Nation-State | Maritime industry targeting | Low activity | Web shells, spear-phishing, AIRBREAK and HOMEFRY malware | -- |
| Daggerfly | Evasive Panda, Bronze Highland, StormBamboo | China (PRC) | Nation-State | Espionage targeting telecom and civil society | Yes | MgBot modular framework, ISP-level DNS poisoning, macOS malware, software update hijacking | -- |
Russia¶
Russia-linked actors are divided across three primary intelligence services -- the GRU (military intelligence, responsible for APT28 and Sandworm), the SVR (foreign intelligence, responsible for APT29), and the FSB (domestic/signals intelligence, responsible for Turla, Gamaredon, and others). Additionally, Russia tolerates and occasionally directs cybercriminal groups that operate from Russian territory, creating a gray zone between state and criminal operations.
The Russia-Ukraine conflict has produced an unprecedented volume of destructive cyber operations (primarily by Sandworm/Seashell Blizzard and Cadet Blizzard/Ember Bear against Ukrainian targets) while simultaneously generating a new generation of hacktivist proxy groups that operate under the direction or tolerance of Russian intelligence. Notably, Russian cyber operations against Ukraine have been extensively documented by Microsoft, ESET, and CERT-UA, creating the most detailed public record of nation-state cyber warfare ever compiled.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| APT29 | Cozy Bear, Midnight Blizzard, The Dukes, Nobelium, Dark Halo, Iron Hemlock, YTTRIUM | Russia (SVR) | Nation-State | Strategic espionage (government, think tanks) | Yes | Supply chain attacks (SolarWinds), cloud exploitation, OAuth abuse, phishing via Teams, stealthy long-term access | Russia |
| APT28 | Fancy Bear, Forest Blizzard, Sofacy, Pawn Storm, Sednit, Strontium, Iron Twilight, TG-4127 | Russia (GRU Unit 26165) | Nation-State | Espionage, election interference, disruption | Yes | Credential phishing, zero-day exploits, edge device exploitation, custom malware (XAgent, X-Tunnel) | Russia |
| Sandworm | Voodoo Bear, Seashell Blizzard, IRIDIUM, Electrum, TeleBots, Iron Viking, Black Energy Group | Russia (GRU Unit 74455) | Nation-State | Destructive attacks, critical infrastructure | Yes | Wiper malware (NotPetya, Industroyer, CaddyWiper), ICS/SCADA attacks, supply chain, false flags | Russia |
| Turla | Venomous Bear, Secret Blizzard, Snake, Waterbug, Krypton, Iron Hunter | Russia (FSB Center 16) | Nation-State | Long-term espionage | Yes | Satellite C2 hijacking, Snake rootkit, hijacking other APT infrastructure, watering holes, Kazuar backdoor | -- |
| Gamaredon | Primitive Bear, Aqua Blizzard, Actinium, Shuckworm, Armageddon | Russia (FSB, Crimea-based) | Nation-State | Ukraine-focused espionage | Yes | High-volume spear-phishing, VBS/PowerShell scripts, USB propagation, rapid retooling | -- |
| Star Blizzard | COLDRIVER, Callisto Group, Seaborgium, TA446, BlueCharlie | Russia (FSB Center 18) | Nation-State | Credential phishing of high-value targets | Yes | Highly targeted spear-phishing, credential harvesting, impersonation of academics/journalists | -- |
| Ember Bear | Cadet Blizzard, DEV-0586, UNC2589 | Russia (GRU) | Nation-State | Destructive operations, Ukraine targeting | Yes | WhisperGate wiper, web defacement, data theft and leak, hack-and-leak operations | -- |
| Evil Corp | Indrik Spider, Dridex Gang, GOLD DRAKE, Manatee Tempest | Russia | Cybercrime / State-nexus | Financial crime, ransomware | Reduced (sanctions) | Dridex trojan, WastedLocker, Hades ransomware, BitPaymer, SocGholish | -- |
| Energetic Bear | Dragonfly, Crouching Yeti, Berserk Bear, Iron Liberty, Havex | Russia (FSB) | Nation-State | Energy sector espionage and pre-positioning | Low activity | ICS/SCADA reconnaissance, supply chain (Havex trojan), watering holes, Citrix exploitation | -- |
| IndigoBolt | Storm-0257 (possible) | Russia (assessed) | Nation-State | Infrastructure targeting | Yes | Exploitation of edge devices, LOTL techniques | -- |
| RomCom | Storm-0978, Tropical Scorpius, UNC2596, Void Rabisu | Russia (assessed) | Cybercrime / Espionage | Dual-purpose: espionage and ransomware | Yes | Trojanized legitimate software, RomCom RAT, Underground ransomware, zero-day exploitation | -- |
| Gossamer Bear | UTA0036 | Russia (assessed) | Nation-State | Credential theft targeting government | Yes | Phishing campaigns, fake login pages, targeting of dissidents and NGOs | -- |
| UAC-0050 | -- | Russia/Ukraine conflict zone | Nation-State | Ukraine targeting, financial fraud | Yes | Remcos RAT, mass phishing, credential theft | -- |
| UAC-0006 | -- | Russia (assessed) | Cybercrime | Financial theft, Ukraine-focused | Yes | SmokeLoader, phishing, banking trojan deployment | -- |
| Winter Vivern | TA473, UAC-0114 | Russia/Belarus (assessed) | Nation-State | Government espionage (Europe) | Yes | Exploitation of Zimbra and Roundcube, spear-phishing, webmail zero-days | -- |
| XakNet | -- | Russia (GRU-linked) | Hacktivism / State-proxy | DDoS, hack-and-leak, Ukraine targeting | Yes | DDoS, data theft, coordination with Sandworm operations | -- |
| Void Blizzard | -- | Russia (GRU, assessed) | Nation-State | NATO and government espionage | Yes | Credential theft, email exfiltration, SharePoint data harvesting, Entra ID enumeration | -- |
North Korea¶
North Korean cyber operations serve a unique dual purpose: intelligence collection and revenue generation for a sanctions-isolated regime. The Reconnaissance General Bureau (RGB) oversees most cyber units, with Lazarus Group and its subgroups responsible for an estimated $1.5B+ in cryptocurrency theft in 2024 alone (including the $1.5B Bybit hack in February 2025, the largest single cryptocurrency theft in history). The IT worker fraud scheme -- placing North Korean operatives in remote IT jobs at Western companies using stolen or fabricated identities -- represents an innovative approach to both revenue generation and potential insider access. The FBI estimates thousands of North Korean IT workers are employed at companies worldwide.
North Korean actors are notable for their operational versatility: the same organizational umbrella conducts financial crime (cryptocurrency theft, SWIFT fraud), espionage (defense sector, nuclear programs), destructive attacks (Sony Pictures, 2014), and supply chain compromises -- often simultaneously.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| Lazarus Group | HIDDEN COBRA, Diamond Sleet, Zinc, Labyrinth Chollima, APT38 (overlap), TAG-71, Nickel Academy | North Korea (RGB) | Nation-State | Revenue generation, espionage, destructive attacks | Yes | Cryptocurrency theft, custom malware families, social engineering of developers, supply chain attacks, SWIFT banking attacks | North Korea |
| Kimsuky | Emerald Sleet, Velvet Chollima, APT43, Thallium, Black Banshee, TA406, Springtail | North Korea (RGB) | Nation-State | Intelligence collection, credential theft | Yes | Spear-phishing (think tank/academic impersonation), credential harvesting, ReconShark, BabyShark malware | -- |
| Andariel | Onyx Sleet, Silent Chollima, Plutonium, DarkSeoul, Stonefly | North Korea (RGB 3rd Bureau) | Nation-State | Espionage + ransomware revenue | Yes | Custom ransomware (Maui), EarlyRat, defense sector targeting, vulnerability exploitation | -- |
| BlueNoroff | Sapphire Sleet, CryptoCore, TA444, COPERNICIUM | North Korea (RGB) | Nation-State | Cryptocurrency and financial theft | Yes | Fake VC firms, social engineering via LinkedIn, cryptocurrency wallet compromise, macOS malware | -- |
| APT43 | Kimsuky overlap, Jade Sleet, TraderTraitor | North Korea (RGB) | Nation-State | Credential harvesting, crypto theft | Yes | Cryptocurrency theft to fund operations, fake personas, blockchain-related social engineering | -- |
| Citrine Sleet | DEV-0139, AppleJeus overlap | North Korea | Nation-State | Cryptocurrency targeting | Yes | Trojanized crypto trading apps, Chrome zero-days, blockchain targeting | -- |
| ScarCruft | Ricochet Chollima, APT37, Reaper, Group123, Venus 121, InkySquid | North Korea (MSS) | Nation-State | Espionage (South Korea, journalists, defectors) | Yes | Zero-day exploitation, RokRAT, watering holes, mobile targeting, Goldbackdoor | -- |
| TEMP.Hermit | Lazarus subgroup, UNC577 | North Korea | Nation-State | Espionage and destructive operations | Yes | AppleJeus, FALLCHILL, custom implants | -- |
| Moonstone Sleet | Storm-1789 | North Korea | Nation-State | Revenue + espionage via fake companies | Yes | Trojanized software, fake game companies, custom ransomware (FakePenny), IT worker schemes | -- |
| Ruby Sleet | CERIUM | North Korea | Nation-State | Defense and aerospace espionage | Yes | Spear-phishing, credential harvesting, defense contractor targeting | -- |
| IT Worker Scheme | Various front companies (Yanbian Silverstar, Volasys Silver Star) | North Korea | Nation-State | Revenue generation via fraud | Yes | Fake identities, remote IT employment, salary collection, insider access abuse, AI-generated profiles | -- |
Iran¶
Iran's cyber capabilities have matured significantly since the Stuxnet era, with operations split between the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS). Iranian actors are distinguished by their willingness to conduct destructive operations (wipers, ICS attacks) and their increasing integration of influence operations with cyber intrusions -- a pattern Mandiant calls "hack-and-leak." The Israel-Hamas conflict (October 2023 onward) has significantly intensified Iranian cyber operations, with both IRGC and MOIS-linked groups increasing their tempo of attacks against Israeli, American, and Gulf state targets.
Iranian groups are generally assessed as less technically sophisticated than their Chinese and Russian counterparts, but they compensate with operational aggressiveness and a willingness to accept risk of attribution. Several Iranian groups have demonstrated the ability to conduct destructive operations against operational technology (OT) targets -- CyberAv3ngers' targeting of Unitronics PLCs at water utilities in late 2023 being a prominent example.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| APT33 | Elfin, Peach Sandstorm, Refined Kitten, Magnallium, Holmium | Iran (IRGC) | Nation-State | Espionage (aviation, energy, defense) | Yes | Password spraying, spear-phishing, Shamoon wiper (affiliated), custom backdoors | -- |
| APT35 | Charming Kitten, Mint Sandstorm, Phosphorus, TA453, Ajax Security, ITG18, Yellow Garuda | Iran (IRGC-IO) | Nation-State | Espionage, dissidents, think tanks, academia | Yes | Spear-phishing (impersonation of journalists/academics), credential harvesting, mobile surveillance, BellaCiao, PowerLess | -- |
| MuddyWater | Mercury, Mango Sandstorm, Static Kitten, Seedworm, TEMP.Zagros, Earth Vetala | Iran (MOIS) | Nation-State | Espionage (Middle East, government) | Yes | Spear-phishing, PowGoop, DLL side-loading, legitimate remote admin tools (Atera, SimpleHelp), living-off-the-land | -- |
| APT42 | Calanque, Charming Kitten subgroup, Mint Sandstorm subgroup | Iran (IRGC-IO) | Nation-State | Credential theft, surveillance of dissidents | Yes | Highly targeted social engineering, NICECURL/TAMECAT backdoors, cloud credential harvesting | -- |
| OilRig | APT34, Helix Kitten, Hazel Sandstorm, Crambus, Chrysene, Cobalt Gypsy, IRN2, Europium | Iran (MOIS) | Nation-State | Espionage (government, telecom, energy) | Yes | DNS tunneling, web shells, custom backdoors (Karkoff, DNSpionage), supply chain, credential theft | -- |
| Moses Staff | Marigold Sandstorm, Abraham's Ax (related) | Iran | Nation-State / Hacktivist | Destructive operations against Israel | Yes | Volume encryption (DCSrv), data theft and leak, hack-and-leak, no ransom demand | -- |
| Agrius | Pink Sandstorm, DEV-0227, BlackShadow | Iran | Nation-State | Destructive attacks disguised as ransomware | Yes | Apostle wiper/ransomware, Fantasy wiper, web shell deployment, data destruction | -- |
| Cotton Sandstorm | Neptunium, DEV-0198, Hazel Sandstorm (partial) | Iran (IRGC affiliated) | Nation-State / IO | Influence operations, hack-and-leak | Yes | Hack-and-leak, propaganda, personas, Charlie Hebdo and election interference operations | -- |
| Tortoiseshell | Crimson Sandstorm, Imperial Kitten, TA456, Yellow Liderc | Iran (IRGC contractor) | Nation-State | Espionage and supply chain targeting | Yes | Watering holes, fake websites, supply chain compromise, social engineering of defense contractors | -- |
| Lyceum | Hexane, Spirlin, Siamesekitten | Iran | Nation-State | Telecom and ISP espionage (Middle East, Africa) | Yes | DNS tunneling, credential spraying, custom backdoors (DanBot, Shark/Milan) | -- |
| CopyKittens | -- | Iran | Nation-State | Espionage (Israel, Germany, academic) | Low activity | Matryoshka RAT, watering holes, macro-laden documents | -- |
| Scarred Manticore | Storm-0861 | Iran (MOIS) | Nation-State | Long-term espionage (Middle East) | Yes | LIONTAIL framework, IIS extensions, web shells, passive implants | -- |
| Plaid Rain | Polonium, DEV-0147 | Iran (MOIS-linked, Lebanon-based) | Nation-State | Espionage targeting Israel | Yes | Cloud service abuse (OneDrive, Dropbox for C2), custom implants, coordination with MuddyWater | -- |
| CyberAv3ngers | Storm-0784 | Iran (IRGC-CEC) | Nation-State / Hacktivist | Critical infrastructure disruption | Yes | PLC/HMI targeting (Unitronics), web defacement, OT/ICS attacks, Israel-linked infrastructure | -- |
Ransomware Groups¶
The ransomware ecosystem has consolidated around the RaaS model, where developers maintain the encryption platform and affiliates conduct the actual intrusions. Law enforcement disruptions in 2023-2024 (Hive, LockBit, ALPHV/BlackCat) have fragmented but not eliminated the ecosystem -- affiliates simply migrate to the next available platform. The trend toward data exfiltration without encryption ("extortion-only") reflects both improved backup resilience among defenders and the realization that data theft alone generates sufficient leverage.
Ransomware Ecosystem Resilience
Despite Operation Cronos (LockBit takedown, Feb 2024), the ALPHV/BlackCat exit scam (Mar 2024), and multiple arrests, the ransomware ecosystem demonstrated remarkable resilience throughout 2024-2025. RansomHub rapidly absorbed displaced LockBit and ALPHV affiliates. New groups (Fog, INC Ransom, Hunters International) emerged to fill gaps. The fundamental economics remain favorable for attackers: median ransom payments continue to exceed $200K, the cost of launching a RaaS operation continues to decline, and the affiliate model distributes risk across many operators. Until the economic equation changes -- through either more effective disruption of cryptocurrency laundering, successful prosecution of affiliates at scale, or substantially improved defensive posture -- the ecosystem will continue to regenerate.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| LockBit | LockBit 2.0/3.0/Green, Bitwise Spider, Storm-0396 | Russia-nexus (RaaS) | Cybercrime | Ransomware-as-a-Service | Disrupted (Feb 2024), attempting rebuild | RaaS model, double extortion, StealBit exfil, broad affiliate network, bug bounty program | Ransomware |
| ALPHV/BlackCat | Noberus, Sphynx Spider | Russia-nexus (RaaS) | Cybercrime | Ransomware-as-a-Service | Disrupted (exit scam Mar 2024) | Rust-based ransomware, triple extortion, SEC complaint tactic, cross-platform | -- |
| Cl0p | TA505 (affiliated), Clop, Lace Tempest, FIN11 overlap | Russia-nexus | Cybercrime | Data extortion (mass exploitation) | Yes | MOVEit, GoAnywhere, Accellion zero-day exploitation, mass file theft, no encryption variant | -- |
| RansomHub | -- | Multi-national (RaaS) | Cybercrime | Ransomware-as-a-Service | Yes | Former ALPHV/BlackCat affiliates, aggressive recruitment, 90/10 affiliate split | -- |
| Akira | Storm-1567, Punk Spider | Russia-nexus (RaaS) | Cybercrime | Ransomware + data theft | Yes | VPN exploitation (Cisco), double extortion, retro-themed leak site, Linux/VMware ESXi variants | -- |
| Black Basta | Storm-0506, Cardinal Spider | Russia-nexus (ex-Conti) | Cybercrime | Ransomware + data extortion | Yes | QakBot distribution, vishing, Teams-based social engineering, double extortion | -- |
| Royal/BlackSuit | DEV-0569 | Russia-nexus (ex-Conti) | Cybercrime | Ransomware | Yes (as BlackSuit) | Callback phishing, SEO poisoning, partial encryption for speed, rebranded from Royal | -- |
| Rhysida | Vice Society overlap (assessed) | Unknown | Cybercrime | Ransomware targeting healthcare/education | Yes | Double extortion, phishing, abuse of legitimate tools, healthcare and government targeting | -- |
| Play | PlayCrypt, Balloonfly | Unknown | Cybercrime | Ransomware | Yes | Exploitation of FortiOS and Exchange, custom tooling, intermittent encryption, no RaaS (closed group) | -- |
| Medusa | MedusaLocker (distinct), Storm-1175 | Unknown | Cybercrime | Ransomware (RaaS) | Yes | Double extortion, Telegram-based operations, time-based ransom negotiation | -- |
| BianLian | -- | Russia-nexus | Cybercrime | Data extortion (shifted from encryption) | Yes | Pivoted to exfiltration-only (no encryption), ProxyShell exploitation, Go-based tooling | -- |
| Vice Society | DEV-0832, Vanilla Tempest overlap | Unknown | Cybercrime | Ransomware targeting education | Reduced | Multiple ransomware families (not custom), education sector focus, overlap with Rhysida | -- |
| Hive | -- | Multi-national | Cybercrime | Ransomware (RaaS) | Disrupted (FBI, Jan 2023) | RaaS, healthcare targeting, affiliates migrated to other groups | -- |
| Conti | Wizard Spider (overlap), Gold Ulrick, Ryuk successor | Russia-nexus | Cybercrime | Ransomware (RaaS) | Disbanded (2022) | TrickBot integration, double extortion, healthcare targeting, fragmented into Black Basta/Royal/others | -- |
| REvil/Sodinokibi | Pinchy Spider, Gold Southfield | Russia-nexus | Cybercrime | Ransomware (RaaS) | Disrupted (2022) | Kaseya supply chain attack, high-profile extortion, affiliate model pioneer | -- |
| DarkSide | Carbon Spider (overlap) | Russia-nexus | Cybercrime | Ransomware (RaaS) | Rebranded (BlackMatter, then dissolved) | Colonial Pipeline attack, ESXi targeting, corporate-style operations | -- |
| Phobos | 8Base (overlap assessed) | Unknown | Cybercrime | Ransomware (RaaS) | Yes | Low-sophistication RaaS, targets SMBs, RDP exploitation, affordable entry point | -- |
| 8Base | Phobos-based (assessed) | Unknown | Cybercrime | Ransomware + data extortion | Yes | Modified Phobos variant, double extortion, SMB targeting | -- |
| INC Ransom | INC | Unknown | Cybercrime | Ransomware | Yes | Citrix Bleed exploitation, spear-phishing, healthcare and government targets | -- |
| Hunters International | Hive successor (code overlap) | Unknown | Cybercrime | Data theft + ransomware | Yes | Acquired Hive codebase, focus on data exfiltration, broad targeting | -- |
| Fog | -- | Unknown | Cybercrime | Ransomware | Yes | Education and recreation sector targeting, rapid encryption, VPN exploitation | -- |
Other Cybercrime¶
Beyond ransomware, the cybercrime ecosystem includes financially motivated groups that specialize in initial access brokerage, malware distribution, point-of-sale fraud, business email compromise, and other schemes. Many of these groups serve as the upstream supply chain for ransomware operators. The distinction between "ransomware groups" and "other cybercrime" is increasingly artificial -- groups like FIN7 have evolved from POS fraud to ransomware access provision, and Scattered Spider moved from SIM swapping to enterprise ransomware in under two years.
The Cybercrime Supply Chain
Modern cybercrime operates as a supply chain, not as isolated groups. Malware distributors (Emotet, QakBot, BumbleBee) deliver initial payloads via phishing. Initial access brokers package and resell the resulting network access on underground forums. Ransomware affiliates purchase access and deploy encryption/exfiltration tools. RaaS developers provide the ransomware platform and negotiation infrastructure. Money laundering services convert cryptocurrency ransoms to fiat currency. Disrupting any single link in this chain creates temporary disruption but does not collapse the ecosystem because each role can be filled by multiple competing providers.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| FIN7 | Carbanak, Carbon Spider, ELBRUS, Sangria Tempest, ITG14 | Russia-nexus | Cybercrime | Financial theft, now supporting ransomware | Yes (evolved) | Point-of-sale malware, social engineering, fake companies (Combi Security), now provides access for ransomware ops | -- |
| FIN8 | Syssphinx, White Rabbit (affiliated) | Unknown | Cybercrime | POS/financial theft | Yes | POS malware (BadHatch), memory scraping, evolved to ransomware deployment | -- |
| FIN11 | TA505 (overlap), Lace Tempest, DEV-0950 | Russia-nexus | Cybercrime | Data extortion, mass exploitation | Yes | Cl0p ransomware operator, Accellion/MOVEit/GoAnywhere exploitation, volume over precision | -- |
| FIN12 | Pistol Tempest, DEV-0237 | Russia-nexus | Cybercrime | Rapid ransomware deployment | Yes | Fast time-to-ransom (under 2 days), skip exfiltration, healthcare targeting, multiple ransomware brands | -- |
| Scattered Spider | Octo Tempest, UNC3944, Star Fraud, Muddled Libra, 0ktapus | Multi-national (English-speaking) | Cybercrime | Data theft, extortion, ransomware | Yes | SIM swapping, MFA fatigue, social engineering of help desks, Okta targeting, ALPHV affiliate, MGM/Caesars attacks | -- |
| TA505 | Hive0065, GOLD TAHOE, FIN11 overlap | Russia-nexus | Cybercrime | Malware distribution, access brokerage | Yes | Dridex, Locky, TrickBot distribution, massive phishing campaigns, now Cl0p affiliate | -- |
| TA577 | -- | Russia-nexus | Cybercrime | Initial access broker | Yes | QakBot distribution, Pikabot, high-volume phishing, thread hijacking | -- |
| Emotet Operators | TA542, Mummy Spider, GOLD CRESTWOOD | Russia/Ukraine nexus | Cybercrime | Malware-as-a-Service | Intermittent (rebuilding post-takedown) | Modular botnet, email thread hijacking, dropper for TrickBot/QakBot/Cobalt Strike | -- |
| Wizard Spider | TrickBot, Conti, Gold Ulrick, ITG23, DEV-0193 | Russia | Cybercrime | Ransomware ecosystem operator | Fragmented | TrickBot/BazarLoader, Conti ransomware, Cobalt Strike, splintered into multiple successor groups | -- |
| QakBot Operators | TA570, Gold Lagoon | Unknown | Cybercrime | Malware distribution / initial access | Rebuilding (post-FBI takedown Aug 2023) | QakBot botnet, email thread hijacking, DLL injection, dropper for ransomware | -- |
| BumbleBee Operators | -- | Unknown (ex-TrickBot linked) | Cybercrime | Malware loader / initial access | Yes | Successor to BazarLoader, ISO/VHD delivery, Google Ads malvertising, enterprise targeting | -- |
| Lapsus$ | DEV-0537, Strawberry Tempest | Multi-national (UK teens) | Cybercrime | Data theft, extortion, notoriety | Reduced (arrests) | SIM swapping, MFA fatigue, insider recruitment, source code theft (Microsoft, NVIDIA, Okta, Samsung) | -- |
| IABs (General) | Multiple individual operators | Various | Cybercrime | Sell network access | Yes | Exploit public-facing apps, credential stuffing, RDP brute force, sell on forums (Exploit, XSS, RAMP) | -- |
Hacktivism and Influence Operations¶
The hacktivist landscape has been transformed by geopolitical conflict. The Russia-Ukraine war and the Israel-Hamas war have created two distinct ecosystems of politically motivated cyber activity, many of which are either directly controlled by or loosely affiliated with state intelligence services.
| Group Name | Aliases | Origin | Category | Primary Objective | Active? | Key TTPs | Deep-Dive |
|---|---|---|---|---|---|---|---|
| Anonymous | -- | Decentralized | Hacktivist | Anti-establishment, various causes | Intermittent | DDoS, data leaks, website defacement, decentralized coordination | -- |
| IT Army of Ukraine | -- | Ukraine | Hacktivist (state-encouraged) | DDoS and disruption of Russian targets | Yes | Crowdsourced DDoS, target coordination via Telegram, attack tooling distribution | -- |
| KillNet | KillMilk | Russia | Hacktivist (state-aligned) | DDoS against NATO/Western targets | Reduced (fragmented) | Low-sophistication DDoS, propaganda-focused, exaggerated impact claims | -- |
| NoName057(16) | -- | Russia | Hacktivist (state-aligned) | DDoS against NATO/Ukraine-supporting nations | Yes | DDoSia tool (crowdsourced), website DDoS, government and transport targeting | -- |
| Anonymous Sudan | Storm-1359 | Sudan/Russia (debated attribution) | Hacktivist / State-proxy | DDoS against Western targets | Disrupted (arrests, Oct 2024) | Application-layer DDoS, Microsoft/Cloudflare targeting, DDoS-for-hire, likely Russian ties | -- |
| CyberAv3ngers | See Iran section | Iran (IRGC-CEC) | Hacktivist / Nation-State | Anti-Israel critical infrastructure attacks | Yes | PLC exploitation (Unitronics), water utility targeting, ICS/OT attacks | -- |
| SiegedSec | -- | Multi-national | Hacktivist | Data leaks, anti-government | Dissolved (2024) | SQL injection, data theft and public leaks, targeted NATO and state government systems | -- |
| GhostSec | -- | Multi-national | Hacktivist | Anti-authoritarian, ICS targeting | Active (evolved) | RTU/PLC scanning, data leaks, briefly pivoted to ransomware, collaboration with Stormous | -- |
State-Proxy Hacktivism
A critical distinction must be drawn between genuine hacktivism (decentralized, ideologically motivated, typically low-sophistication) and state-proxy hacktivism (directed or tolerated by intelligence services, using hacktivist branding for plausible deniability). Groups like KillNet, NoName057(16), and Anonymous Sudan fall into the latter category. Their operational coordination with known state actors (documented by multiple vendors), timing aligned with geopolitical events, and access to infrastructure inconsistent with volunteer operations all point to state involvement. For defenders, the distinction matters because state-proxy hacktivists may escalate to more destructive operations when directed to do so, while genuine hacktivists typically remain at the DDoS/defacement level.
Emerging: AI-Augmented Threat Actors¶
While not a distinct group, the use of AI by existing threat actors is reshaping the landscape and deserves specific attention. As of early 2026, AI augmentation has moved beyond the experimental stage into routine operational use by both nation-state and cybercriminal actors.
Observed AI-Augmented Activity (2024-2026)
- APT28 and APT29 have used LLMs for scripting, reconnaissance research, and social engineering refinement (Microsoft/OpenAI, Feb 2024)
- Kimsuky and Emerald Sleet used LLMs for target research and phishing content generation
- Crimson Sandstorm (Iran) used LLMs for social engineering and code debugging
- Cybercriminals are leveraging AI for deepfake voice/video in BEC attacks, automated phishing at scale, polymorphic malware generation, and vulnerability research acceleration
- FraudGPT/WormGPT represented early attempts at uncensored criminal AI tools, though their impact has been overstated relative to jailbreaks of mainstream models
- Vishing at scale has become a documented trend, with AI-generated voice calls used in social engineering campaigns against IT help desks (Scattered Spider pattern, now widely adopted)
| AI Capability | Impact on Threat Actors | Timeline | Defensive Segments Affected |
|---|---|---|---|
| Phishing content generation | Higher quality, multi-language, fewer indicators | Now (widespread) | Email Security, Security Awareness |
| Deepfake voice/video | BEC and social engineering amplification | Now (growing) | Identity, Security Awareness |
| Automated reconnaissance | Faster target profiling and OSINT | Now | Threat Intel, Vuln/ASM |
| Automated vulnerability research | Faster zero-day discovery and exploit development | Emerging (2025+) | Vuln/ASM, AppSec, Endpoint |
| Polymorphic malware | Signature evasion at scale | Emerging | Endpoint, Network |
| Autonomous attack chaining | Multi-step attacks without human guidance | Anticipated (2026+) | All segments |
Implications for Defenders¶
The AI augmentation of threat actors has several concrete implications for cybersecurity product strategy:
- Email security must evolve beyond static indicators. AI-generated phishing eliminates the grammatical errors, awkward phrasing, and template patterns that traditional detections rely on. Behavioral analysis (sender reputation, communication graph anomalies, intent analysis) becomes the primary detection layer.
- Security awareness training faces an existential challenge. If AI can generate perfect phishing emails customized to each recipient, click-rate-based training metrics become meaningless. The field must shift toward reporting culture and organizational resilience rather than individual phishing simulation pass rates.
- Identity verification needs out-of-band confirmation for high-risk transactions. Deepfake voice and video mean that a phone call or video conference is no longer sufficient to verify identity for actions like wire transfers, credential resets, or access grants.
- Endpoint and network security vendors must assume that malware will increasingly evade static signatures. Behavioral detection, memory forensics, and anomaly-based approaches gain further importance.
- Threat intelligence platforms must track not just which actors use AI, but how AI changes their operational tempo and targeting patterns. Faster reconnaissance and exploit development means shorter windows between vulnerability disclosure and mass exploitation.
Market Implications by Actor Category¶
Understanding which threat actors drive which market segments is essential for product strategy and investment analysis. The following summarizes the primary market implications of each actor category.
How Threat Actors Shape Market Demand
Every major cybersecurity product category exists because of a specific threat actor behavior. EDR exists because of advanced persistent threats. Email security exists because of phishing. Identity security exists because of credential theft. Understanding the actor-to-segment mapping helps predict where demand will grow as actor TTPs evolve.
Nation-state actors (China, Russia, North Korea, Iran):
- Drive demand for threat intelligence platforms -- organizations need attribution context, IOC feeds, and campaign tracking to understand whether they are targeted by state actors
- Create the business case for network detection and response (NDR) and OT/IoT security -- ICS/SCADA targeting by Sandworm, CyberAv3ngers, and Volt Typhoon makes industrial security a board-level concern
- Validate Zero Trust architecture investments -- living-off-the-land techniques used by Volt Typhoon and APT29 bypass perimeter-based defenses entirely
- Justify cloud security spending -- APT29's exploitation of OAuth tokens, Azure AD, and cloud services demonstrates that cloud environments are primary targets, not safe havens
Ransomware and cybercrime actors:
- Represent the single largest driver of endpoint security (EDR/XDR) spending -- ransomware is the threat that CISOs lose sleep over and boards fund against
- Fuel the MDR/MSSP market -- organizations that cannot staff 24/7 SOCs turn to managed services specifically because of ransomware risk
- Drive data security and backup investments -- the shift to double extortion (encrypt + exfiltrate) means that backups alone are no longer sufficient
- Create demand for email security -- phishing remains the dominant initial access vector for ransomware affiliates
- Expand the cyber insurance market, which in turn imposes security requirements that drive product adoption across multiple segments
Hacktivists and influence operators:
- Drive DDoS mitigation and web application firewall (WAF) demand -- DDoS remains the primary hacktivist tool
- Create awareness (if not always budget) for security awareness training and influence operation detection
- The state-proxy hacktivist trend validates investment in threat intelligence that can distinguish genuine grassroots hacktivism from state-directed operations
Insider threats:
- Drive the data loss prevention (DLP) and data security posture management (DSPM) markets
- Justify identity governance and administration (IGA) and privileged access management (PAM) investments
- Create demand for user and entity behavior analytics (UEBA) -- detecting anomalous access patterns is the primary technical control against malicious insiders
Deep-Dive Pages¶
The following individual threat actor deep-dives are available or planned. Each deep-dive includes detailed TTP analysis mapped to MITRE ATT&CK, campaign timelines, notable incidents, defensive recommendations, and market impact assessment.
Available¶
| Actor | Page | Category | Priority Rationale |
|---|---|---|---|
| Volt Typhoon | China | China / Nation-State | Highest-impact critical infrastructure threat; directly drives OT/IoT, Network, and ZTNA market demand |
| Salt Typhoon | China | China / Nation-State | Telecom infrastructure compromise with strategic implications; drives telecom security and lawful intercept market |
| APT41 | China | China / Dual-purpose | Unique dual espionage-cybercrime mission; demonstrates state-criminal convergence trend |
| APT29 | Russia | Russia / Nation-State | SolarWinds and ongoing cloud-focused operations; primary driver of supply chain and cloud security demand |
| APT28 | Russia | Russia / Nation-State | Election interference, edge device exploitation; drives email security and edge/VPN security demand |
| Sandworm | Russia | Russia / Nation-State | Most destructive cyber actor (NotPetya, Industroyer); primary driver of OT/ICS security market |
| Lazarus Group | North Korea | North Korea / Nation-State | Largest cryptocurrency theft operation; drives cryptocurrency security and financial sector demand |
| LockBit | Ransomware | Ransomware / Cybercrime | Most prolific ransomware operation (pre-disruption); case study in RaaS model and law enforcement disruption |
Planned¶
Deep-dive pages for the following actors are planned, prioritized by market impact:
- Scattered Spider / Octo Tempest -- Social engineering innovation, identity attack vectors
- Cl0p -- Mass exploitation model, file transfer platform targeting
- Kimsuky / APT43 -- Credential theft ecosystem, IT worker fraud scheme
- Turla / Secret Blizzard -- Advanced tradecraft, infrastructure hijacking
- APT35 / Charming Kitten -- Social engineering sophistication, mobile surveillance
- Black Basta -- Post-Conti ecosystem evolution
- RansomHub -- Post-disruption ecosystem reformation
Cross-References¶
Related Sections
- Threat Landscape Overview -- Macro-level analysis of breach trends, financial impact, and the structural reasons why defenses fail
- Threat Intelligence Segment -- Market analysis of TIP platforms, dark web monitoring vendors, and the threat intel ecosystem
- Pain Points & Friction -- Cross-segment analysis of defender challenges, including alert fatigue and tool sprawl that threat actors exploit
- OT/IoT Security -- Critical infrastructure defense against nation-state actors (Volt Typhoon, Sandworm, CyberAv3ngers)
- Identity & Access -- Identity-based attack vectors exploited by nearly every threat actor category
- Endpoint Security -- EDR/XDR platforms that form the primary detection layer against most threat actors
- Email Security -- Phishing defense, the initial access vector for the majority of threat actors listed above
Sources¶
This catalog draws from the following primary sources. Individual group entries reference specific reports in their deep-dive pages.
- MITRE ATT&CK -- Groups knowledge base and technique mappings
- CISA -- Advisories, alerts, and joint cybersecurity bulletins (especially Joint CSAs with FBI, NSA)
- Microsoft Threat Intelligence -- Threat actor profiles, naming taxonomy, blog publications
- Mandiant/Google Threat Intelligence -- M-Trends annual reports, APT research, UNC tracking
- CrowdStrike -- Annual Global Threat Reports, adversary profiles
- Recorded Future -- Insikt Group research, threat actor TAG tracking
- Dragos -- ICS/OT-specific threat group analysis (annual Year in Review reports)
- Secureworks -- Counter Threat Unit (CTU) research and State of the Threat reports
- Unit 42 (Palo Alto Networks) -- Threat actor and campaign reports
- ESET -- APT activity reports, threat research blog
- Kaspersky GReAT -- APT research and reporting
- The DFIR Report -- Community-driven intrusion analysis with detailed TTP documentation
- Cisco Talos -- Threat research, vulnerability intelligence, and campaign tracking
- Check Point Research -- Threat intelligence publications and campaign analysis
- Sophos X-Ops -- Active adversary reports and ransomware ecosystem analysis
- ENISA -- EU Agency for Cybersecurity threat landscape reports
Key Annual Reports¶
The following recurring publications are particularly valuable for tracking threat actor evolution year-over-year:
| Report | Publisher | Frequency | Focus |
|---|---|---|---|
| Global Threat Report | CrowdStrike | Annual (Feb) | Adversary trends, eCrime ecosystem, nation-state activity |
| M-Trends | Mandiant/Google | Annual (Apr) | Incident response data, dwell time metrics, APT campaigns |
| Threat Intelligence Index | IBM X-Force | Annual (Feb) | Attack vectors, industry targeting, geographic trends |
| Digital Defense Report | Microsoft | Annual (Oct) | Nation-state activity, cybercrime trends, AI threats |
| Data Breach Investigations Report (DBIR) | Verizon | Annual (May) | Incident patterns, actor motives, breach demographics |
| Year in Review | Dragos | Annual (Feb) | ICS/OT threat landscape, activity group updates |
| State of the Threat | Secureworks | Annual (Oct) | CTU research findings, threat actor evolution |
| Internet Crime Report | FBI IC3 | Annual | Reported cybercrime losses, BEC trends, ransomware complaints |
Maintenance
The threat actor landscape evolves continuously. This catalog reflects known activity and attributions as of early 2026. Groups may rebrand, merge, splinter, or go dormant. New aliases are assigned as vendors update their taxonomies. Deep-dive pages for individual actors will be added progressively -- priority is given to actors with the highest current impact on cybersecurity product demand and market dynamics.
Attribution Caveats
All attributions in this catalog reflect the assessed consensus of the cited sources. Cyber attribution is inherently uncertain -- it relies on technical indicators, operational patterns, victimology, and intelligence sources that may be incomplete or deliberately misleading (false flag operations are documented, notably by Sandworm). "Assessed" means the weight of available evidence supports the attribution but absolute certainty is rarely achievable. Where attribution is contested or uncertain, this is noted in the relevant entry.
Glossary¶
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
A¶
| Term | Definition |
|---|---|
| ACL | Access Control List — rules determining which users/systems can access resources |
| APT | Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access |
| ASM | Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets |
| ASPM | Application Security Posture Management — unified visibility and risk management across the application lifecycle |
| AV | Antivirus — software designed to detect, prevent, and remove malware |
B¶
| Term | Definition |
|---|---|
| BAS | Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls |
| BEC | Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data |
C¶
| Term | Definition |
|---|---|
| C2 | Command and Control — infrastructure used by attackers to communicate with compromised systems |
| CASB | Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers |
| CCPA | California Consumer Privacy Act — California state law granting consumers rights over their personal data |
| CIAM | Customer Identity and Access Management — managing and securing external customer identities and authentication |
| CIEM | Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments |
| CTEM | Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures |
| CNAPP | Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle |
| CSPM | Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks |
| CWPP | Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless) |
| CVE | Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities |
D¶
| Term | Definition |
|---|---|
| DAST | Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks |
| DCS | Distributed Control System — a control system for managing industrial processes across multiple locations |
| DLP | Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage |
| DORA | Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities |
| DSPM | Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments |
E¶
| Term | Definition |
|---|---|
| EASM | External Attack Surface Management — discovering and monitoring internet-facing assets for exposures |
| EDR | Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities |
| EPP | Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response |
F/G¶
| Term | Definition |
|---|---|
| FAIR | Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk |
| GRC | Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations |
| GDPR | General Data Protection Regulation — EU regulation on data protection and privacy for individuals |
H¶
| Term | Definition |
|---|---|
| HIPAA | Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information |
I¶
| Term | Definition |
|---|---|
| IAB | Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers |
| IAM | Identity and Access Management — framework for managing digital identities and controlling access to resources |
| ICS | Industrial Control System — control systems used in industrial production and critical infrastructure |
| IDS | Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts |
| ITDR | Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises |
| IoT | Internet of Things — network of physical devices embedded with sensors, software, and connectivity |
| IPS | Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic |
L¶
| Term | Definition |
|---|---|
| LOTL | Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection |
M¶
| Term | Definition |
|---|---|
| MaaS | Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals |
| MDR | Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response |
| MITRE ATT&CK | MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques |
| MSSP | Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices |
| MFA | Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource |
N¶
| Term | Definition |
|---|---|
| NDR | Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns |
| NERC CIP | North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid |
| NGAV | Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection |
| NIS2 | Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities |
| NIST CSF | National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk |
O¶
| Term | Definition |
|---|---|
| OT | Operational Technology — hardware and software that monitors and controls physical devices and processes |
| OWASP | Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance |
P¶
| Term | Definition |
|---|---|
| PAM | Privileged Access Management — securing, managing, and monitoring privileged accounts and access |
| PCI DSS | Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data |
| PII | Personally Identifiable Information — any data that could identify a specific individual |
| PLC | Programmable Logic Controller — an industrial computer used to control manufacturing processes |
R¶
| Term | Definition |
|---|---|
| RaaS | Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits |
| RGB | Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations |
S¶
| Term | Definition |
|---|---|
| SASE | Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud |
| SAST | Static Application Security Testing — analyzing source code for vulnerabilities without executing the application |
| SBOM | Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product |
| SCA | Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase |
| SCADA | Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely |
| SD-WAN | Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic |
| SEG | Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies |
| SIEM | Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance |
| SOAR | Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows |
| SOC | Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents |
| SOX | Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies |
| SSE | Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services |
| SWG | Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats |
T¶
| Term | Definition |
|---|---|
| TAM | Total Addressable Market — the total revenue opportunity available for a product or service |
| TCO | Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime |
| TIP | Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data |
| TLS | Transport Layer Security — a cryptographic protocol that provides secure communication over a network |
| TTP | Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations |
V¶
| Term | Definition |
|---|---|
| VM | Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities |
X¶
| Term | Definition |
|---|---|
| XDR | Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email |
Z¶
| Term | Definition |
|---|---|
| ZTNA | Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles |