Skip to content

Hide Navigation Hide TOC

Edit

Microsoft Activity Group actor

Activity groups as described by Microsoft

Authors
Authors and/or Contributors
Various

Amethyst Rain

Microsoft threat actor profile. Origin/Threat: Lebanon.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Amethyst Rain.

Known Synonyms
Volatile Cedar
VolcanicTimber
Internal MISP references

UUID 043ebe48-3101-5f67-9dd0-de3c9f230031 which can be used as unique global reference for Amethyst Rain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country LB
microsoft-origin-threat Lebanon

Antique Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Antique Typhoon.

Known Synonyms
Storm-0558
Internal MISP references

UUID ae55260b-eafa-5492-bfa1-19676ade75d2 which can be used as unique global reference for Antique Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Aqua Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Aqua Blizzard.

Known Synonyms
ACTINIUM
Armageddon
Gamaredon
Primitive Bear
SectorC08
UNC530
shuckworm
Internal MISP references

UUID fc77a775-d06f-5efc-a6fa-0b2af01902a7 which can be used as unique global reference for Aqua Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

BARIUM

Microsoft Threat Intelligence associates Winnti with multiple activity groups—collections of malware, supporting infrastructure, online personas, victimology, and other attack artifacts that the Microsoft intelligent security graph uses to categorize and attribute threat activity. Microsoft labels activity groups using code names derived from elements in the periodic table. In the case of this malware, the activity groups strongly associated with Winnti are BARIUM and LEAD. But even though they share the use of Winnti, the BARIUM and LEAD activity groups are involved in very different intrusion scenarios. BARIUM begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms. Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits. Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C. Later stages of the intrusions rely upon Winnti for persistent access. The majority of victims recorded to date have been in electronic gaming, multimedia, and Internet content industries, although occasional intrusions against technology companies have occurred.

Internal MISP references

UUID cc70bdbd-afa7-4e19-bba2-2443811ef3af which can be used as unique global reference for BARIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Berry Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Berry Sandstorm.

Known Synonyms
Storm-0852
Internal MISP references

UUID 7482e4fa-ae4e-5827-a357-46b1a55c4f59 which can be used as unique global reference for Berry Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran

Blue Tsunami

Microsoft threat actor profile. Origin/Threat: Israel, Private sector offensive actor.

Internal MISP references

UUID 258a5cd1-f040-5a2e-8f04-6787bf2f1ae7 which can be used as unique global reference for Blue Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IL
microsoft-origin-threat Israel, Private sector offensive actor

Brass Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Brass Typhoon.

Known Synonyms
APT41
BARIUM
WICKED PANDA
Internal MISP references

UUID 2fc42ffc-dd1a-560e-ac97-05e8fa27bbe5 which can be used as unique global reference for Brass Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Brocade Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Brocade Typhoon.

Known Synonyms
APT3
BORON
CYBRAN
GOTHIC PANDA
OLDCARP
Red Sylvan
TG-0110
UPS
Internal MISP references

UUID 53f1281b-790d-5183-9306-b1b1ac38b715 which can be used as unique global reference for Brocade Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Burgundy Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Burgundy Sandstorm.

Known Synonyms
Cadelle
Chafer
REMIX KITTEN
Internal MISP references

UUID 855828a7-8e3d-5ee7-8c5c-8bb619f6db6c which can be used as unique global reference for Burgundy Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran

Cadet Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cadet Blizzard.

Known Synonyms
DEV-0586
EMBER BEAR
Internal MISP references

UUID 7f190457-6829-55c4-9b6b-bccdadb747cb which can be used as unique global reference for Cadet Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Camouflage Tempest

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Camouflage Tempest.

Known Synonyms
FIN6
Skeleton Spider
TAAL
Internal MISP references

UUID 3126bd2c-3d04-5174-ad03-40136b94f574 which can be used as unique global reference for Camouflage Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
sector Financially motivated
Related clusters

To see the related clusters, click here.

Canary Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Canary Typhoon.

Known Synonyms
APT24
BlackTech
CIRCUIT PANDA
Palmerworm
Internal MISP references

UUID 59b25baf-5d3b-5e98-824a-2a0b0764e961 which can be used as unique global reference for Canary Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Canvas Cyclone

Microsoft threat actor profile. Origin/Threat: Vietnam.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Canvas Cyclone.

Known Synonyms
APT32
BISMUTH
OCEAN BUFFALO
OceanLotus
Internal MISP references

UUID 37808cab-cbb3-560b-bebd-375fa328ea1e which can be used as unique global reference for Canvas Cyclone in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country VN
microsoft-origin-threat Vietnam
sector Vietnam
Related clusters

To see the related clusters, click here.

Caramel Tsunami

Microsoft threat actor profile. Origin/Threat: Israel, Private sector offensive actor.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Caramel Tsunami.

Known Synonyms
Candiru
DEV-0236
SOURGUM
Internal MISP references

UUID 1b15288c-ff19-5f52-8c4b-6185de934ff8 which can be used as unique global reference for Caramel Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IL
microsoft-origin-threat Israel, Private sector offensive actor
sector Private sector offensive actor

Carmine Tsunami

Microsoft threat actor profile. Origin/Threat: Private sector offensive actor.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Carmine Tsunami.

Known Synonyms
DEV-0196
QuaDream
Internal MISP references

UUID ab6940c3-a2f0-5802-9270-87f15f2e168a which can be used as unique global reference for Carmine Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Private sector offensive actor
sector Private sector offensive actor

Charcoal Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Charcoal Typhoon.

Known Synonyms
AQUATIC PANDA
BRONZE UNIVERSITY
CHROMIUM
ControlX
RedHotel
Internal MISP references

UUID 3f8b7c98-7484-523f-9d58-181274e6fc8f which can be used as unique global reference for Charcoal Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Checkered Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Checkered Typhoon.

Known Synonyms
APT19
ATG50
CHLORINE
DEEP PANDA
Red Gargoyle
TG-3551
Internal MISP references

UUID df9c1947-9c78-5538-b4b8-a6385e77c5bb which can be used as unique global reference for Checkered Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Cinnamon Tempest

Microsoft threat actor profile. Origin/Threat: China, Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cinnamon Tempest.

Known Synonyms
Bronze Starlight
DEV-0401
Emperor Dragonfly
HighGround
Internal MISP references

UUID 43fe584d-88e5-5f2b-a9fd-a866e62040bb which can be used as unique global reference for Cinnamon Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China, Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

Circle Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Circle Typhoon.

Known Synonyms
APT27
APT6
DEV-0322
EMISSARY PANDA
Internal MISP references

UUID 0bebd962-191a-5671-b5b0-f6de7c8180fc which can be used as unique global reference for Circle Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China

Citrine Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Citrine Sleet.

Known Synonyms
LABYRINTH CHOLLIMA
Storm-0139
Storm-1222
Internal MISP references

UUID c4004152-f87a-5052-b02b-5602ee3c0fd3 which can be used as unique global reference for Citrine Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Clay Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Clay Typhoon.

Known Synonyms
Storm-2416
Internal MISP references

UUID 5730cf0f-286d-5f10-9eb0-e5242ec87f08 which can be used as unique global reference for Clay Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Copper Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Copper Typhoon.

Known Synonyms
Earth Akhlut
Sharp-R
Tonto Team
Internal MISP references

UUID 32525044-46ee-54c1-a81d-90ee1b9abeb4 which can be used as unique global reference for Copper Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Coral Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Coral Sleet.

Known Synonyms
Storm-1877
Internal MISP references

UUID 7146aa01-7139-54d7-bd58-d9be2957b64e which can be used as unique global reference for Coral Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Cotton Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cotton Sandstorm.

Known Synonyms
DEV-0198
HAYWIRE KITTEN
NEPTUNIUM
Vice Leaker
Internal MISP references

UUID b06ff51a-77e7-5b7f-9938-4a2d37bce5a4 which can be used as unique global reference for Cotton Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

CovertNetwork-1658

Microsoft threat actor profile. Origin/Threat: Covert network.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular CovertNetwork-1658.

Known Synonyms
ORB07
Internal MISP references

UUID 8fe1ecdc-5718-5a05-9778-df58c0687b32 which can be used as unique global reference for CovertNetwork-1658 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Covert network

Crescent Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Crescent Typhoon.

Known Synonyms
CESIUM
Internal MISP references

UUID f0321b6d-ba72-556c-b2eb-df47e188ad5c which can be used as unique global reference for Crescent Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Crimson Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Crimson Sandstorm.

Known Synonyms
CURIUM
HOUSEBLEND
IMPERIAL KITTEN
TA456
Tortoise Shell
Internal MISP references

UUID b76e22b0-26a4-50ca-b876-09bc90a81b3b which can be used as unique global reference for Crimson Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

Cuboid Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Cuboid Sandstorm.

Known Synonyms
DEV-0228
IMPERIAL KITTEN
Internal MISP references

UUID badacab7-5097-5817-8516-d8a72de2a71b which can be used as unique global reference for Cuboid Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

Daffodil Gust

Microsoft threat actor profile. Origin/Threat: United Arab Emirates.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Daffodil Gust.

Known Synonyms
Fruity Armor
Project Raven
Stealth Falcon
Internal MISP references

UUID 667c2c4e-42bf-5383-ac1d-8a875d6c03a8 which can be used as unique global reference for Daffodil Gust in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country AE
microsoft-origin-threat United Arab Emirates

Denim Tsunami

Microsoft threat actor profile. Origin/Threat: Austria, Private sector offensive actor.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Denim Tsunami.

Known Synonyms
DEV-0291
DSIRF
KNOTWEED
Internal MISP references

UUID 9a4a662a-84a9-5b86-b241-7c5eef9cea4d which can be used as unique global reference for Denim Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country AT
microsoft-origin-threat Austria, Private sector offensive actor
sector Private sector offensive actor

Diamond Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Diamond Sleet.

Known Synonyms
Black Artemis
Labyrinth Chollima
Lazarus
ZINC
Internal MISP references

UUID 9630b0aa-ee9e-5b58-9f79-cf7fa8d291a8 which can be used as unique global reference for Diamond Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea
Related clusters

To see the related clusters, click here.

DUBNIUM

DUBNIUM (which shares indicators with what Kaspersky researchers have called DarkHotel) is one of the activity groups that has been very active in recent years, and has many distinctive features.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular DUBNIUM.

Known Synonyms
darkhotel
Internal MISP references

UUID b56af6ab-69f8-457a-bf50-c3aefa6dc14a which can be used as unique global reference for DUBNIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Emerald Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Emerald Sleet.

Known Synonyms
Black Banshee
Greendinosa
Kimsuky
RGB-D5
THALLIUM
Velvet Chollima
Internal MISP references

UUID 44be06b1-e17a-5ea6-a0a2-067933a7af77 which can be used as unique global reference for Emerald Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea
Related clusters

To see the related clusters, click here.

Fallow Squall

Microsoft threat actor profile. Origin/Threat: Singapore.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Fallow Squall.

Known Synonyms
GINGERSNAP
PARASITE
PLATINUM
RUBYVINE
Internal MISP references

UUID 6d0809db-12c3-5193-ad5b-33dbb98fe379 which can be used as unique global reference for Fallow Squall in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country SG
microsoft-origin-threat Singapore

Flax Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Flax Typhoon.

Known Synonyms
ETHEREAL PANDA
Storm-0919
Internal MISP references

UUID fd257ab6-5245-52c1-a456-7138d72112ac which can be used as unique global reference for Flax Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Forest Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Forest Blizzard.

Known Synonyms
APT28
ATG2
Blue Athena
CrisisFour
Fancy Bear
HELLFIRE
Operation Pawn Storm
STRONTIUM
Sednit
Sofacy
Tsar Team
Z-Lom Team
Internal MISP references

UUID 8d84d7b0-7716-5ab3-a3a4-f373dd148347 which can be used as unique global reference for Forest Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

GADOLINIUM

GADOLINIUM is a nation-state activity group that has been compromising targets for nearly a decade with a worldwide focus on the maritime and health industries. As with most threat groups, GADOLINIUM tracks the tools and techniques of security practitioners looking for new techniques they can use or modify to create new exploit methods. Historically, GADOLINIUM used custom-crafted malware families that analysts can identify and defend against. In response, over the last year GADOLINIUM has begun to modify portions of its toolchain to use open-source toolkits to obfuscate their activity and make it more difficult for analysts to track. Because cloud services frequently offer a free trial or one-time payment (PayGo) account offerings, malicious actors have found ways to take advantage of these legitimate business offerings. By establishing free or PayGo accounts, they can use cloud-based technology to create a malicious infrastructure that can be established quickly then taken down before detection or given up at little cost.

Internal MISP references

UUID 99e708f7-1c01-467d-b0da-f6cebd434abc which can be used as unique global reference for GADOLINIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

GALLIUM

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need to protect themselves. By sharing the detailed methodology and indicators related to GALLIUM activity, we’re encouraging the security community to implement active defenses to secure the broader ecosystem from these attacks. To compromise targeted networks, GALLIUM target unpatched internet-facing services using publicly available exploits and have been known to target vulnerabilities in WildFly/JBoss. Once persistence is established in a network, GALLIUM uses common techniques and tools like Mimikatz to obtain credentials that allows for lateral movement across the target network. Within compromised networks, GALLIUM makes no attempt to obfuscate their intent and are known to use common versions of malware and publicly available toolkits with small modifications. The operators rely on low cost and easy to replace infrastructure that consists of dynamic-DNS domains and regularly reused hop points. This activity from GALLIUM has been identified predominantly through 2018 to mid-2019. GALLIUM is still active; however, activity levels have dropped when compared to what was previously observed.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular GALLIUM.

Known Synonyms
Operation Soft Cell
Internal MISP references

UUID 6085aad0-1d95-11ea-a140-078d42aced40 which can be used as unique global reference for GALLIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Ghost Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Ghost Blizzard.

Known Synonyms
BERSERK BEAR
BROMINE
Blue Kraken
Crouching Yeti
Dragonfly
Energetic Bear
Koala Team
TG-4192
Internal MISP references

UUID 45d0f984-2b63-517b-922a-12924bcf4f68 which can be used as unique global reference for Ghost Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Gingham Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Gingham Typhoon.

Known Synonyms
APT40
Feverdream
GADOLINIUM
JJDoor
Kryptonite Panda
Leviathan
TEMP.Periscope
Internal MISP references

UUID dbc45b46-5b64-50d4-b0f1-d7de888d4e85 which can be used as unique global reference for Gingham Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Granite Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Granite Typhoon.

Known Synonyms
GALLIUM
PHANTOM PANDA
Internal MISP references

UUID ae4036de-c901-5f21-808a-f5c071ef509b which can be used as unique global reference for Granite Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Gray Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Gray Sandstorm.

Known Synonyms
DEV-0343
Internal MISP references

UUID 395473c6-be98-5369-82d1-cdbc97b3fddc which can be used as unique global reference for Gray Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

HAFNIUM

HAFNIUM primarily targets entities in the United States across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs. HAFNIUM has previously compromised victims by exploiting vulnerabilities in internet-facing servers, and has used legitimate open-source frameworks, like Covenant, for command and control. Once they’ve gained access to a victim network, HAFNIUM typically exfiltrates data to file sharing sites like MEGA. In campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with victim Office 365 tenants. While they are often unsuccessful in compromising customer accounts, this reconnaissance activity helps the adversary identify more details about their targets’ environments. HAFNIUM operates primarily from leased virtual private servers (VPS) in the United States.

Internal MISP references

UUID fbb66d6c-0faa-49cc-8aa3-2f9bd4e9c298 which can be used as unique global reference for HAFNIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Hazel Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Hazel Sandstorm.

Known Synonyms
APT34
Cobalt Gypsy
Crambus
EUROPIUM
HELIX KITTEN
OilRig
Internal MISP references

UUID b6260d6d-a2f7-5b79-8132-5c456a225f53 which can be used as unique global reference for Hazel Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Heart Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Heart Typhoon.

Known Synonyms
APT17
ATG3
AURORA PANDA
DeputyDog
HELIUM
Hidden Lynx
KAOS
Red Typhoon
SportsFans
TG-8153
Tailgater
Internal MISP references

UUID a418d583-d520-5207-bec9-b634417d7f41 which can be used as unique global reference for Heart Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Hexagon Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Hexagon Typhoon.

Known Synonyms
APT12
Calc Team
DNS-Calc
HORDE
HYDROGEN
NUMBERED PANDA
Red Anubis
Internal MISP references

UUID a8df4364-1b52-5cee-b103-da42fa640ddc which can be used as unique global reference for Hexagon Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Houndstooth Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Houndstooth Typhoon.

Known Synonyms
DRAGNET PANDA
HASSIUM
deepclif
isoon
Internal MISP references

UUID 7f875c7f-8209-5faa-877e-c0b5708d1a70 which can be used as unique global reference for Houndstooth Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Jade Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Jade Sleet.

Known Synonyms
LABYRINTH CHOLLIMA
Storm-0954
Internal MISP references

UUID 67df1658-fa43-5cd0-9234-7ff2b86c2a8b which can be used as unique global reference for Jade Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Jasper Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Jasper Sleet.

Known Synonyms
Storm-0287
Internal MISP references

UUID c7b33217-b9d9-538d-8947-63dc0d89e9dc which can be used as unique global reference for Jasper Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Lace Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Lace Tempest.

Known Synonyms
DEV-0950
FIN11
TA505
Internal MISP references

UUID b27dcdee-14b1-5842-86b3-32eacec94584 which can be used as unique global reference for Lace Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

LEAD

In contrast, LEAD has established a far greater reputation for industrial espionage. In the past few years, LEAD’s victims have included: Multinational, multi-industry companies involved in the manufacture of textiles, chemicals, and electronics Pharmaceutical companies A company in the chemical industry University faculty specializing in aeronautical engineering and research A company involved in the design and manufacture of motor vehicles A cybersecurity company focusing on protecting industrial control systems During these intrusions, LEAD’s objective was to steal sensitive data, including research materials, process documents, and project plans. LEAD also steals code-signing certificates to sign its malware in subsequent attacks. In most cases, LEAD’s attacks do not feature any advanced exploit techniques. The group also does not make special effort to cultivate victims prior to an attack. Instead, the group often simply emails a Winnti installer to potential victims, relying on basic social engineering tactics to convince recipients to run the attached malware. In some other cases, LEAD gains access to a target by brute-forcing remote access login credentials, performing SQL injection, or exploiting unpatched web servers, and then they copy the Winnti installer directly to compromised machines.

Internal MISP references

UUID f542442e-ba0f-425d-b386-6c10351a468e which can be used as unique global reference for LEAD in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Lemon Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Lemon Sandstorm.

Known Synonyms
Fox Kitten
PIONEER KITTEN
PioneerKitten
RUBIDIUM
UNC757
Internal MISP references

UUID 0757856a-1313-57d8-bb6c-f4c537e110da which can be used as unique global reference for Lemon Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Leopard Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Leopard Typhoon.

Known Synonyms
KAOS
LEAD
Mana
Red Diablo
TG-2633
TG-3279
WICKED PANDA
Winnti Group
Internal MISP references

UUID 7796ae6d-a7fe-5ec0-976d-badff57ac65b which can be used as unique global reference for Leopard Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Lilac Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Lilac Typhoon.

Known Synonyms
DEV-0234
Internal MISP references

UUID aa45a89c-4c2b-5f6b-9a3d-51abccaa9623 which can be used as unique global reference for Lilac Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China

Linen Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Linen Typhoon.

Known Synonyms
APT27
BOWSER
EMISSARY PANDA
Hippo
IODINE
Lucky Mouse
Red Phoenix
TG-3390
UNC215
Wekby2
Internal MISP references

UUID 45dc2a46-f0b1-5b5c-bf32-57d160542800 which can be used as unique global reference for Linen Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Luna Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID 1a85f99d-4fe1-5e89-bc84-32710f64ff69 which can be used as unique global reference for Luna Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Magenta Dust

Microsoft threat actor profile. Origin/Threat: TĂĽrkiye.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Magenta Dust.

Known Synonyms
PROMETHIUM
SmallPity
StrongPity
Internal MISP references

UUID 0d0c07ff-2246-5f59-80c7-b3b743252a76 which can be used as unique global reference for Magenta Dust in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country TR
microsoft-origin-threat TĂĽrkiye

Manatee Tempest

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Manatee Tempest.

Known Synonyms
DEV-0243
EvilCorp
Indrik Spider
UNC2165
Internal MISP references

UUID b19bc1a0-2489-56ae-aa61-ed147310363e which can be used as unique global reference for Manatee Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Financially motivated
Related clusters

To see the related clusters, click here.

Mango Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Mango Sandstorm.

Known Synonyms
MERCURY
MuddyWater
SeedWorm
Static Kitten
TEMP.Zagros
Internal MISP references

UUID da68ca6d-250f-50f1-a585-240475fdbb35 which can be used as unique global reference for Mango Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Marbled Dust

Microsoft threat actor profile. Origin/Threat: TĂĽrkiye.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Marbled Dust.

Known Synonyms
COSMIC WOLF
SILICON
Sea Turtle
UNC1326
Internal MISP references

UUID fc91881e-92c0-5a63-a0b9-b253958a594e which can be used as unique global reference for Marbled Dust in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country TR
microsoft-origin-threat TĂĽrkiye
sector Turkey
Related clusters

To see the related clusters, click here.

Marigold Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Marigold Sandstorm.

Known Synonyms
DEV-0500
DEV-500
Moses Staff
VENGEFUL KITTEN
Internal MISP references

UUID ef415059-e150-5324-877e-44b65ab022f5 which can be used as unique global reference for Marigold Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Midnight Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Midnight Blizzard.

Known Synonyms
APT29
Cozy Bear
NOBELIUM
UNC2452
Internal MISP references

UUID 31982812-c8bf-5e85-b0ba-0c64a7d05d20 which can be used as unique global reference for Midnight Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Mint Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Mint Sandstorm.

Known Synonyms
APT35
Charming Kitten
Newscaster
PHOSPHORUS
Parastoo
Internal MISP references

UUID 400cd1b8-52b7-5a5c-984f-9b4af35ea231 which can be used as unique global reference for Mint Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Moonstone Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Moonstone Sleet.

Known Synonyms
LABYRINTH CHOLLIMA
Storm-1789
Internal MISP references

UUID b1e94607-7211-585d-8197-73e7d9229400 which can be used as unique global reference for Moonstone Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Mulberry Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Mulberry Typhoon.

Known Synonyms
APT5
ATG48
Auriga
Backdoor-DPD
Bottle
COVENANT
CYSERVICE
Keyhole Panda
MANGANESE
Red Horus
Red Naga
TABCTENG
TG-2754
Internal MISP references

UUID fa562b27-d3ff-5e7c-9079-c957eb01a0e0 which can be used as unique global reference for Mulberry Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Mustard Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Mustard Tempest.

Known Synonyms
DEV-0206
INDRIK SPIDER
Purple Vallhund
Internal MISP references

UUID 1b1524f4-16b0-5b85-aea4-844babea4ccb which can be used as unique global reference for Mustard Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated

NEODYMIUM

NEODYMIUM is an activity group that is known to use a backdoor malware detected by Microsoft as Wingbird. This backdoor’s characteristics closely match FinFisher, a government-grade commercial surveillance package. Data about Wingbird activity indicate that it is typically used to attack individual computers instead of networks.

Internal MISP references

UUID 47b5007a-3fb1-466a-9578-629e6e735493 which can be used as unique global reference for NEODYMIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Neva Flood

Microsoft threat actor profile. Origin/Threat: Russia, Influence operations.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Neva Flood.

Known Synonyms
CopyCop
Storm-1516
Internal MISP references

UUID 50ad9a39-a0c3-5ade-af96-fb57ea465bd5 which can be used as unique global reference for Neva Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia, Influence operations

Night Tsunami

Microsoft threat actor profile. Origin/Threat: Israel.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Night Tsunami.

Known Synonyms
DEV-0336
NSO Group
Internal MISP references

UUID af54315b-3561-5046-8b9b-c3e9e05c0f77 which can be used as unique global reference for Night Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IL
microsoft-origin-threat Israel
sector Private sector offensive actor

NOBELIUM

Threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware.

Internal MISP references

UUID d7247cf9-13b6-4781-b789-a5f33521633b which can be used as unique global reference for NOBELIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Nylon Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Nylon Typhoon.

Known Synonyms
APT15
Mirage
NICKEL
Playful Dragon
RedRiver
Vixen Panda
ke3chang
Internal MISP references

UUID 66571167-13fe-5817-93e0-54ae8f206fdc which can be used as unique global reference for Nylon Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Octo Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Octo Tempest.

Known Synonyms
0ktapus
SCATTERED SPIDER
Internal MISP references

UUID 565b1ffa-6aa0-534d-a7bd-82ae942dd813 which can be used as unique global reference for Octo Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Oka Flood

Microsoft threat actor profile. Origin/Threat: Russia, Influence operations.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Oka Flood.

Known Synonyms
Storm-1679
Internal MISP references

UUID 3f0694c2-605d-5ac3-bdd2-09c2d4be3d73 which can be used as unique global reference for Oka Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia, Influence operations

Onyx Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Onyx Sleet.

Known Synonyms
APT45
Andariel
Black Chollima
DarkSeoul
PLUTONIUM
SILENT CHOLLIMA
StoneFly
Tdrop2 campaign
Internal MISP references

UUID 26a2854b-51e4-5fc9-8c30-2880d1483ed1 which can be used as unique global reference for Onyx Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea

Opal Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Opal Sleet.

Known Synonyms
APT43
Konni
OSMIUM
Planedown
VELVET CHOLLIMA
Internal MISP references

UUID 5163b2d9-7521-5225-a7a8-88d881fbc406 which can be used as unique global reference for Opal Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea

PARINACOTA

One actor that has emerged in this trend of human-operated attacks is an active, highly adaptive group that frequently drops Wadhrama as payload. PARINACOTA impacts three to four organizations every week and appears quite resourceful: during the 18 months that we have been monitoring it, we have observed the group change tactics to match its needs and use compromised machines for various purposes, including cryptocurrency mining, sending spam emails, or proxying for other attacks. The group’s goals and payloads have shifted over time, influenced by the type of compromised infrastructure, but in recent months, they have mostly deployed the Wadhrama ransomware. The group most often employs a smash-and-grab method, whereby they attempt to infiltrate a machine in a network and proceed with subsequent ransom in less than an hour. There are outlier campaigns in which they attempt reconnaissance and lateral movement, typically when they land on a machine and network that allows them to quickly and easily move throughout the environment. PARINACOTA’s attacks typically brute forces their way into servers that have Remote Desktop Protocol (RDP) exposed to the internet, with the goal of moving laterally inside a network or performing further brute-force activities against targets outside the network. This allows the group to expand compromised infrastructure under their control. Frequently, the group targets built-in local administrator accounts or a list of common account names. In other instances, the group targets Active Directory (AD) accounts that they compromised or have prior knowledge of, such as service accounts of known vendors. The group adopted the RDP brute force technique that the older ransomware called Samas (also known as SamSam) infamously used. Other malware families like GandCrab, MegaCortext, LockerGoga, Hermes, and RobbinHood have also used this method in targeted ransomware attacks. PARINACOTA, however, has also been observed to adapt to any path of least resistance they can utilize. For instance, they sometimes discover unpatched systems and use disclosed vulnerabilities to gain initial access or elevate privileges.

Internal MISP references

UUID 00edb40d-2fed-4d36-98b1-c85fc2bb1168 which can be used as unique global reference for PARINACOTA in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Patched Lightning

Microsoft threat actor profile from the public naming mapping feed.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Patched Lightning.

Known Synonyms
Storm-0113
Internal MISP references

UUID aac2327b-d330-55a0-8ead-d20df7413a56 which can be used as unique global reference for Patched Lightning in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value

Peach Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Peach Sandstorm.

Known Synonyms
APT33
Elfin
HOLMIUM
Refined Kitten
Internal MISP references

UUID 4c0f085a-70b1-5ee6-a45a-dc368f03e701 which can be used as unique global reference for Peach Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran
Related clusters

To see the related clusters, click here.

Pearl Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pearl Sleet.

Known Synonyms
DEV-0215
LAWRENCIUM
Internal MISP references

UUID 1c5c67ad-c241-5103-99d0-daab5a554b0d which can be used as unique global reference for Pearl Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea

Pepper Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pepper Typhoon.

Known Synonyms
CL-STA-0969
LIMINAL PANDA
Internal MISP references

UUID dfdd0ccd-9755-5988-8b23-595d0188608f which can be used as unique global reference for Pepper Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Periwinkle Tempest

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Periwinkle Tempest.

Known Synonyms
DEV-0193
UNC2053
Wizard Spider
Internal MISP references

UUID 120dc1ae-e850-5059-a4fb-520748ca6881 which can be used as unique global reference for Periwinkle Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Financially motivated
Related clusters

To see the related clusters, click here.

Phlox Tempest

Microsoft threat actor profile. Origin/Threat: Israel, Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Phlox Tempest.

Known Synonyms
Choziosi loader
Chrome Loader
ClickPirate
DEV-0796
Internal MISP references

UUID 3c9a0350-8d17-5624-872c-fe44969a5888 which can be used as unique global reference for Phlox Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IL
microsoft-origin-threat Israel, Financially motivated
sector Financially motivated

Pink Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pink Sandstorm.

Known Synonyms
AMERICIUM
Agrius
BlackShadow
DEV-0227
Deadwood
FireAnt
Justice Blade
SPECTRAL KITTEN
SharpBoys
Internal MISP references

UUID cca311c0-dc91-5aee-b282-5e412040dac3 which can be used as unique global reference for Pink Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

Pinstripe Lightning

Microsoft threat actor profile from the public naming mapping feed.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pinstripe Lightning.

Known Synonyms
Arid Viper
Desert Falcons
NIOBIUM
RENEGADE JACKAL
Scimitar
Internal MISP references

UUID 21d4413c-47f5-55c5-8074-aef6212c88ec which can be used as unique global reference for Pinstripe Lightning in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value

Pistachio Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pistachio Tempest.

Known Synonyms
DEV-0237
FIN12
Internal MISP references

UUID 567ea386-a78f-5550-ae7c-9c9eacdf45af which can be used as unique global reference for Pistachio Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

Plaid Rain

Microsoft threat actor profile. Origin/Threat: Lebanon.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Plaid Rain.

Known Synonyms
INCENDIARY JACKAL
POLONIUM
Internal MISP references

UUID ce5357da-0e15-5022-bd4f-74aa689d0b2e which can be used as unique global reference for Plaid Rain in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country LB
microsoft-origin-threat Lebanon
sector Lebanon
Related clusters

To see the related clusters, click here.

PLATINUM

PLATINUM has been targeting its victims since at least as early as 2009, and may have been active for several years prior. Its activities are distinctly different not only from those typically seen in untargeted attacks, but from many targeted attacks as well. A large share of targeted attacks can be characterized as opportunistic: the activity group changes its target profiles and attack geographies based on geopolitical seasons, and may attack institutions all over the world. Like many such groups, PLATINUM seeks to steal sensitive intellectual property related to government interests, but its range of preferred targets is consistently limited to specific governmental organizations, defense institutes, intelligence agencies, diplomatic institutions, and telecommunication providers in South and Southeast Asia. The group’s persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.

Internal MISP references

UUID 154e97b5-47ef-415a-99a6-2157f1b50339 which can be used as unique global reference for PLATINUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

PROMETHIUM

PROMETHIUM is an activity group that has been active as early as 2012. The group primarily uses Truvasys, a first-stage malware that has been in circulation for several years. Truvasys has been involved in several attack campaigns, where it has masqueraded as one of server common computer utilities, including WinUtils, TrueCrypt, WinRAR, or SanDisk. In each of the campaigns, Truvasys malware evolved with additional features—this shows a close relationship between the activity groups behind the campaigns and the developers of the malware.

Internal MISP references

UUID 5744f91a-d2d8-4f92-920f-943dd80c578f which can be used as unique global reference for PROMETHIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Pumpkin Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Pumpkin Sandstorm.

Known Synonyms
DEV-0146
ZeroCleare
Internal MISP references

UUID 562049d7-78f5-5a65-b7db-c509c9f483f7 which can be used as unique global reference for Pumpkin Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

Purple Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Purple Typhoon.

Known Synonyms
AEON
APT10
ChChes
Evilgrab
Foxmail
Foxtrot
GOLEM
Haymaker
LIVESAFE
MenuPass
POTASSIUM
Red Apollo
STONE PANDA
Webmonder
Internal MISP references

UUID 2a3bd953-67fc-5966-a333-2c954522dec4 which can be used as unique global reference for Purple Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Raspberry Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Raspberry Typhoon.

Known Synonyms
APT30
LOTUS PANDA
LotusBlossom
RADIUM
Internal MISP references

UUID b3c378fc-1ce3-5a46-a32e-f55a584c6536 which can be used as unique global reference for Raspberry Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Red Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Red Sandstorm.

Known Synonyms
BANISHED KITTEN
Storm-0842
Void Manticore
Internal MISP references

UUID 46db3943-9a37-5f2b-8238-5b768934785e which can be used as unique global reference for Red Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran

Ruby Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Ruby Sleet.

Known Synonyms
CERIUM
VELVET CHOLLIMA
Internal MISP references

UUID c29e7262-6a6f-501d-8c00-57f75f2172a3 which can be used as unique global reference for Ruby Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea

Ruza Flood

Microsoft threat actor profile. Origin/Threat: Russia, Influence operations.

Internal MISP references

UUID bf33d93e-070c-5e0f-87b6-7bd25c881155 which can be used as unique global reference for Ruza Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia, Influence operations

Salmon Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Salmon Typhoon.

Known Synonyms
APT4
MAVERICK PANDA
SODIUM
Internal MISP references

UUID 6da413e3-a027-5616-af21-0702f67ae972 which can be used as unique global reference for Salmon Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Salt Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Salt Typhoon.

Known Synonyms
FamousSparrow
GhostEmperor
OPERATOR PANDA
Internal MISP references

UUID 3b357ed0-c50c-5793-b0e9-e60ada7a50e5 which can be used as unique global reference for Salt Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Sangria Tempest

Microsoft threat actor profile. Origin/Threat: Ukraine, Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Sangria Tempest.

Known Synonyms
Carbon Spider
ELBRUS
FIN7
Internal MISP references

UUID 9471ad21-0553-5483-bf7c-e6ad9c062c79 which can be used as unique global reference for Sangria Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country UA
microsoft-origin-threat Ukraine, Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

Sapphire Sleet

Microsoft threat actor profile. Origin/Threat: North Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Sapphire Sleet.

Known Synonyms
Alluring Pisces
BlueNoroff
COPERNICIUM
CageyChameleon
CryptoCore
Genie Spider
STARDUST CHOLLIMA
UNC1069
Internal MISP references

UUID 3a32c54d-d86a-55de-b16a-d9a08a5cf49b which can be used as unique global reference for Sapphire Sleet in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
microsoft-origin-threat North Korea
sector North Korea
Related clusters

To see the related clusters, click here.

Satin Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Satin Typhoon.

Known Synonyms
APT18
COMBINE
DYNAMITE PANDA
Elderwood Group
Red Wraith
SCANDIUM
SILVERVIPER
TG-0416
Wekby
Internal MISP references

UUID 073df49d-f3c8-5459-b8d8-89e7beb348ef which can be used as unique global reference for Satin Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Seashell Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Seashell Blizzard.

Known Synonyms
APT44
BE2
BlackEnergy Lite
Blue Echidna
IRIDIUM
PHANTOM
Sandworm
UAC-0113
VOODOO BEAR
Internal MISP references

UUID 473eb51c-36cb-5e3a-8347-2f57df809be9 which can be used as unique global reference for Seashell Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Secret Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Secret Blizzard.

Known Synonyms
ATG26
Blue Python
KRYPTON
Snake
Turla
Uroburos
Venomous Bear
WRAITH
Internal MISP references

UUID 8d19da8a-d0fa-5194-ad6f-315cc4f36c8b which can be used as unique global reference for Secret Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Sefid Flood

Microsoft threat actor profile. Origin/Threat: Iran, Influence operations.

Internal MISP references

UUID 61f350a3-6507-5045-a3ef-0a5f773c9fe0 which can be used as unique global reference for Sefid Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran, Influence operations

Shadow Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Shadow Typhoon.

Known Synonyms
DarkShadow
Oro0lxy
Storm-0062
Internal MISP references

UUID 4349a6d9-7838-57dc-9873-ddd5835ae428 which can be used as unique global reference for Shadow Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Silk Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Silk Typhoon.

Known Synonyms
HAFNIUM
MURKY PANDA
timmy
Internal MISP references

UUID 9728610a-17cb-5cac-9322-ef19ae296a29 which can be used as unique global reference for Silk Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Smoke Sandstorm

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Smoke Sandstorm.

Known Synonyms
BOHRIUM
IMPERIAL KITTEN
UNC1549
Internal MISP references

UUID 4426d375-1435-5ccc-8c1f-f8688bd11f80 which can be used as unique global reference for Smoke Sandstorm in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran
sector Iran

Spandex Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Spandex Tempest.

Known Synonyms
CHIMBORAZO
MONTY SPIDER
TA505
Internal MISP references

UUID c85120d0-c397-5d30-9d57-3b019090acd5 which can be used as unique global reference for Spandex Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

Star Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Star Blizzard.

Known Synonyms
BlueCharlie
COLDRIVER
Callisto
Callisto Group
Reuse Team
SEABORGIUM
TA446
Internal MISP references

UUID 06630ccd-98ed-5aec-8083-e04c894bd2d6 which can be used as unique global reference for Star Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia
sector Russia
Related clusters

To see the related clusters, click here.

Storm-0133

Microsoft threat actor profile. Origin/Threat: Iran.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0133.

Known Synonyms
HEXANE
Lyceum
Siamesekitten
Spirlin
Internal MISP references

UUID dd5654f6-4ea2-53d9-bdd7-4e4e1d07dd86 which can be used as unique global reference for Storm-0133 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran

Storm-0156

Microsoft threat actor profile. Origin/Threat: Pakistan.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0156.

Known Synonyms
APT36
MYTHIC LEOPARD
SideCopy
Transparent Tribe
Internal MISP references

UUID 5df61c0b-9a22-5125-a9a6-048acca641a4 which can be used as unique global reference for Storm-0156 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country PK
microsoft-origin-threat Pakistan

Storm-0216

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0216.

Known Synonyms
TUNNEL SPIDER
UNC2198
Internal MISP references

UUID 4435483b-a130-5d25-96f2-3625ed1d02b5 which can be used as unique global reference for Storm-0216 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-0230

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0230.

Known Synonyms
Conti Team 1
WIZARD SPIDER
Internal MISP references

UUID 7d9a8d61-6863-5c80-941d-840a1de3a944 which can be used as unique global reference for Storm-0230 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0247

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0247.

Known Synonyms
ToddyCat
Websiic
Internal MISP references

UUID 7a81f6b8-1e7f-5f28-8f69-8267bec40406 which can be used as unique global reference for Storm-0247 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-0249

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID fc30a605-a6af-5f02-b93d-e2c352370cb3 which can be used as unique global reference for Storm-0249 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0252

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0252.

Known Synonyms
CHATTY SPIDER
Internal MISP references

UUID 303e4e4f-4ae5-52aa-9f17-0dd0f7f99223 which can be used as unique global reference for Storm-0252 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0257

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0257.

Known Synonyms
DEV-0257
UNC1151
Internal MISP references

UUID 60ac9e2c-b3b2-5c6b-913e-935952e14c28 which can be used as unique global reference for Storm-0257 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
sector Group in development
Related clusters

To see the related clusters, click here.

Storm-0259

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 2c858cc8-fb74-5e4e-a92d-e57471bba3a1 which can be used as unique global reference for Storm-0259 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0288

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0288.

Known Synonyms
FIN8
Internal MISP references

UUID 6671d8ae-7856-595e-8b84-680c02131493 which can be used as unique global reference for Storm-0288 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0302

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0302.

Known Synonyms
NARWHAL SPIDER
TA544
Internal MISP references

UUID 71761cb6-1046-574b-a438-2dbc32733503 which can be used as unique global reference for Storm-0302 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0408

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 24435633-bfd9-58e8-8199-ad37d46d6b59 which can be used as unique global reference for Storm-0408 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0485

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 6541e7b1-c2bb-575e-90f1-49305625c17b which can be used as unique global reference for Storm-0485 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0501

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID 559c8dc4-1022-50ed-9f1c-d7715737fd87 which can be used as unique global reference for Storm-0501 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-0530

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0530.

Known Synonyms
DEV-0530
H0lyGh0st
Internal MISP references

UUID ab314f1c-8d07-5edb-bb32-64d1105f74ff which can be used as unique global reference for Storm-0530 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KP
sector North Korea

Storm-0538

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0538.

Known Synonyms
FIN6
SKELETON SPIDER
Internal MISP references

UUID 8ad930d9-fcdb-531b-827f-c4a05c36e152 which can be used as unique global reference for Storm-0538 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0539

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID b5678bd7-4ec0-51c0-8371-0846cc558e98 which can be used as unique global reference for Storm-0539 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-0569

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID d7bd75a2-15e3-5293-a53a-5a467326f5de which can be used as unique global reference for Storm-0569 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-0593

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0593.

Known Synonyms
InvisiMole
Internal MISP references

UUID 44bd7d68-2522-55b2-86ee-d1f74fe95281 which can be used as unique global reference for Storm-0593 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia

Storm-0671

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0671.

Known Synonyms
Tropicalscorpius
UNC2596
Internal MISP references

UUID d4c3823c-1535-597b-8e7d-784612ade7aa which can be used as unique global reference for Storm-0671 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-0940

Microsoft threat actor profile. Origin/Threat: China.

Internal MISP references

UUID c83eb0f5-eaff-5b3b-b938-4f9068255bf7 which can be used as unique global reference for Storm-0940 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-0978

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-0978.

Known Synonyms
RomCom
Underground Team
Internal MISP references

UUID b2e3b39d-3988-530d-be21-ccc4f31f0caa which can be used as unique global reference for Storm-0978 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia

Storm-1101

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 69b69079-ccb0-5d6a-a69c-86b5c4fae168 which can be used as unique global reference for Storm-1101 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1113

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1113.

Known Synonyms
APOTHECARY SPIDER
Internal MISP references

UUID 669b24db-d543-560a-851a-5ba81a586350 which can be used as unique global reference for Storm-1113 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-1125

Microsoft threat actor profile. Origin/Threat: Belarus.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1125.

Known Synonyms
MoustachedBouncer
Internal MISP references

UUID c373a2a3-f80d-515f-b1d8-13595c47de11 which can be used as unique global reference for Storm-1125 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country BY
microsoft-origin-threat Belarus

Storm-1152

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID d9d23fe2-8efb-51cf-8913-91ed75f9379e which can be used as unique global reference for Storm-1152 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-1175

Microsoft threat actor profile. Origin/Threat: China, Financially motivated.

Internal MISP references

UUID fdb4a217-6ea3-58bd-b0af-35c01ebb5cad which can be used as unique global reference for Storm-1175 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China, Financially motivated

Storm-1194

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1194.

Known Synonyms
MONTI
Internal MISP references

UUID 45b05a13-80ac-5f99-82a0-7c0bc41bc38a which can be used as unique global reference for Storm-1194 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1249

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 3fc0b642-a037-5165-9e4b-c64e8f9593e2 which can be used as unique global reference for Storm-1249 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1516

Microsoft threat actor profile. Origin/Threat: Russia, Influence operations.

Internal MISP references

UUID 8b3ef1b4-c68d-56b8-8767-a2c293f4a65e which can be used as unique global reference for Storm-1516 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia, Influence operations

Storm-1567

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1567.

Known Synonyms
PUNK SPIDER
Internal MISP references

UUID ba96d568-f803-50c9-907b-d11947123257 which can be used as unique global reference for Storm-1567 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-1575

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 567d3da5-d486-5f6c-a5f6-ed5cb4990ee2 which can be used as unique global reference for Storm-1575 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1607

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID a90661e5-8b7a-5206-807f-aef8517aaf23 which can be used as unique global reference for Storm-1607 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1674

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID 30ed08d3-db95-5d08-9504-9e9781a253d4 which can be used as unique global reference for Storm-1674 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-1747

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 317f8679-6add-5f53-9d60-a233bc860519 which can be used as unique global reference for Storm-1747 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1811

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1811.

Known Synonyms
CURLY SPIDER
Internal MISP references

UUID 6784f384-a942-5d7a-b693-4f8e383d54e0 which can be used as unique global reference for Storm-1811 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-1865

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID f0f9425a-f3ba-59ad-b1a7-41ec0bed10e3 which can be used as unique global reference for Storm-1865 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-1982

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-1982.

Known Synonyms
SneakyCheff
UNK_SweetSpecter
Internal MISP references

UUID 2df0d679-4402-54c9-8a04-af98861312a7 which can be used as unique global reference for Storm-1982 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-2035

Microsoft threat actor profile. Origin/Threat: Iran, Influence operations.

Internal MISP references

UUID 67b75e8c-2a19-523f-ae3c-0e56fde9875b which can be used as unique global reference for Storm-2035 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country IR
microsoft-origin-threat Iran, Influence operations

Storm-2077

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-2077.

Known Synonyms
TAG-100
Internal MISP references

UUID bb60789d-b159-53a7-b852-6f076380cf4e which can be used as unique global reference for Storm-2077 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-2227

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 919c0184-9b73-55f5-9f70-f931155ac58c which can be used as unique global reference for Storm-2227 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-2372

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 35f8662a-f8a2-57b4-9ae2-df4d05e93b80 which can be used as unique global reference for Storm-2372 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-2460

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-2460.

Known Synonyms
Lumma Stealer
Internal MISP references

UUID d43caa08-f997-582f-ae95-c522dbc486a6 which can be used as unique global reference for Storm-2460 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-2470

Microsoft threat actor profile. Origin/Threat: China.

Internal MISP references

UUID 20935d1b-dafd-5373-bfd1-df8519507641 which can be used as unique global reference for Storm-2470 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-2477

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID 1476ebb5-2336-53b0-a1c6-d23bab1497a8 which can be used as unique global reference for Storm-2477 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-2561

Microsoft threat actor profile. Origin/Threat: Group in development.

Internal MISP references

UUID fdaa6bfe-3b2a-5947-a6eb-71a12002719f which can be used as unique global reference for Storm-2561 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Storm-2603

Microsoft threat actor profile. Origin/Threat: China.

Internal MISP references

UUID afe95d2e-227c-59d3-918f-007163912e8f which can be used as unique global reference for Storm-2603 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Storm-2657

Microsoft threat actor profile. Origin/Threat: United States, Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-2657.

Known Synonyms
Payroll Pirates
Internal MISP references

UUID e7d96acd-a70c-5589-847f-1d6a8c6788ba which can be used as unique global reference for Storm-2657 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat United States, Financially motivated

Storm-2755

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Internal MISP references

UUID 5f98bdf4-a39c-5e99-ba2d-fc36c10c2b0c which can be used as unique global reference for Storm-2755 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Storm-2981

Microsoft threat actor profile. Origin/Threat: Group in development.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Storm-2981.

Known Synonyms
Coinbase Cartel
Internal MISP references

UUID 2dcf0edc-5cc9-5100-8e7b-11b5fa93b659 which can be used as unique global reference for Storm-2981 in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Group in development

Strawberry Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Strawberry Tempest.

Known Synonyms
DEV-0537
LAPSUS$
SLIPPY SPIDER
Internal MISP references

UUID d4dfb329-822c-5db3-a078-a8c0f77924da which can be used as unique global reference for Strawberry Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated
Related clusters

To see the related clusters, click here.

STRONTIUM

STRONTIUM has been active since at least 2007. Whereas most modern untargeted malware is ultimately profit-oriented, STRONTIUM mainly seeks sensitive information. Its primary institutional targets have included government bodies, diplomatic institutions, and military forces and installations in NATO member states and certain Eastern European countries. Additional targets have included journalists, political advisors, and organizations associated with political activism in central Asia. STRONTIUM is an activity group that usually targets government agencies, diplomatic institutions, and military organizations, as well as affiliated private sector organizations such as defense contractors and public policy research institutes. Microsoft has attributed more 0-day exploits to STRONTIUM than any other tracked group in 2016. STRONTIUM frequently uses compromised e-mail accounts from one victim to send malicious e-mails to a second victim and will persistently pursue specific targets for months until they are successful in compromising the victims’ computer.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular STRONTIUM.

Known Synonyms
APT 28
APT28
Fancy Bear
Grey-Cloud
Group-4127
Pawn Storm
Sednit
Sofacy
TG-4127
TsarTeam
Internal MISP references

UUID 213cdde9-c11a-4ea9-8ce0-c868e9826fec which can be used as unique global reference for STRONTIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
Related clusters

To see the related clusters, click here.

Sunglow Blizzard

Microsoft threat actor profile from the public naming mapping feed.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Sunglow Blizzard.

Known Synonyms
DEV-0665
Internal MISP references

UUID 79f8646f-d127-51b7-b502-b096b445c322 which can be used as unique global reference for Sunglow Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
sector Russia

Swirl Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Swirl Typhoon.

Known Synonyms
Bronze Butler
REDBALDKNIGHT
STALKER PANDA
TELLURIUM
Tick
Internal MISP references

UUID 655dd99e-fc7d-5f7b-88f0-796d6beb4857 which can be used as unique global reference for Swirl Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Taffeta Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Taffeta Typhoon.

Known Synonyms
APT26
BEARCLAW
JerseyMikes
Red Kobold
TECHNETIUM
TG-0055
TURBINE PANDA
Internal MISP references

UUID 31da9f81-56d4-5c95-87c3-ec4568cdfc2a which can be used as unique global reference for Taffeta Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Taizi Flood

Microsoft threat actor profile. Origin/Threat: China, Influence operations.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Taizi Flood.

Known Synonyms
Dragonbridge
Spamouflage
Internal MISP references

UUID f69bbe03-a0c5-5f59-ada9-e1b9f1beea0c which can be used as unique global reference for Taizi Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China, Influence operations

TERBIUM

Microsoft Threat Intelligence identified similarities between this recent attack and previous 2012 attacks against tens of thousands of computers belonging to organizations in the energy sector. Microsoft Threat Intelligence refers to the activity group behind these attacks as TERBIUM, following our internal practice of assigning rogue actors chemical element names.

Internal MISP references

UUID 99784b80-6298-45ba-885c-0ed37bfd8324 which can be used as unique global reference for TERBIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.

Tomato Tempest

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Tomato Tempest.

Known Synonyms
SPURR
Vatet
Internal MISP references

UUID 028b667a-1102-5b1e-9726-edbf145d9d8f which can be used as unique global reference for Tomato Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
sector Financially motivated

Tumbleweed Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Tumbleweed Typhoon.

Known Synonyms
Karst
THORIUM
Internal MISP references

UUID c58445b5-0c8c-5844-83ef-5c3a7176f0e1 which can be used as unique global reference for Tumbleweed Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Twill Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Twill Typhoon.

Known Synonyms
BRONZE PRESIDENT
LuminousMoth
MUSTANG PANDA
TANTALUM
Internal MISP references

UUID 4020ad2a-fa0e-56f2-a33a-bffb3b1717f6 which can be used as unique global reference for Twill Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Vanilla Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Vanilla Tempest.

Known Synonyms
DEV-0832
VICE SPIDER
Vice Society
Internal MISP references

UUID a01da064-988c-5ad3-92c6-9537adb6a5f0 which can be used as unique global reference for Vanilla Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated

Velvet Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Velvet Tempest.

Known Synonyms
ALPHA SPIDER
DEV-0504
Internal MISP references

UUID 0662a721-a92e-50b3-a5ac-0c4142ac9aeb which can be used as unique global reference for Velvet Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated
sector Financially motivated

Violet Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Violet Typhoon.

Known Synonyms
APT31
Chameleon
JUDGMENT PANDA
WebFans
ZIRCONIUM
Internal MISP references

UUID 27eb4928-b3e6-5ae1-bbb6-f73bce8d7c69 which can be used as unique global reference for Violet Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China
sector China
Related clusters

To see the related clusters, click here.

Void Blizzard

Microsoft threat actor profile. Origin/Threat: Russia.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Void Blizzard.

Known Synonyms
Laundry Bear
Internal MISP references

UUID 0bd1fd55-daef-51ad-82c5-4d79859f87d1 which can be used as unique global reference for Void Blizzard in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia

Volga Flood

Microsoft threat actor profile. Origin/Threat: Russia, Influence operations.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Volga Flood.

Known Synonyms
Rybar
Storm-1841
Internal MISP references

UUID 5efac1a3-ede6-53d5-88d5-6c650df36cab which can be used as unique global reference for Volga Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country RU
microsoft-origin-threat Russia, Influence operations

Volt Typhoon

Microsoft threat actor profile. Origin/Threat: China.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Volt Typhoon.

Known Synonyms
BRONZE SILHOUETTE
VANGUARD PANDA
Internal MISP references

UUID 7c4a32dc-24d5-5d69-96a2-9d0a2ae0f31b which can be used as unique global reference for Volt Typhoon in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China

Wheat Tempest

Microsoft threat actor profile. Origin/Threat: Financially motivated.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Wheat Tempest.

Known Synonyms
GOLD
Gatak
Internal MISP references

UUID 9288268f-8511-5932-8a0c-f240c0799603 which can be used as unique global reference for Wheat Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat Financially motivated

Wine Tempest

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Wine Tempest.

Known Synonyms
PARINACOTA
Wadhrama
Internal MISP references

UUID 5939e42e-06d0-5719-8072-62f0fc0821e8 which can be used as unique global reference for Wine Tempest in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
sector Financially motivated
Related clusters

To see the related clusters, click here.

Wisteria Tsunami

Microsoft threat actor profile. Origin/Threat: India, Private sector offensive actor.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Wisteria Tsunami.

Known Synonyms
CyberRoot
DEV-0605
MintedSoil
Internal MISP references

UUID 2263b6c9-861a-5971-b882-9ea4a84fcf74 which can be used as unique global reference for Wisteria Tsunami in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
microsoft-origin-threat India, Private sector offensive actor
sector Private sector offensive actor

Yulong Flood

Microsoft threat actor profile. Origin/Threat: China, Influence operations.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Yulong Flood.

Known Synonyms
Storm-1852
Internal MISP references

UUID 18e08038-d73d-5f35-9851-b226e499c438 which can be used as unique global reference for Yulong Flood in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country CN
microsoft-origin-threat China, Influence operations

Zigzag Hail

Microsoft threat actor profile. Origin/Threat: Korea.

Synonyms

"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Zigzag Hail.

Known Synonyms
APT-C-60
DUBNIUM
Dark Hotel
Egobot
Fallout Team
Nemim
PALADIN
Purple Pygmy
SHADOW CRANE
TEMPLAR
Tapaoux
TieOnJoe
Internal MISP references

UUID 0a4ddab3-a1a6-5372-b11f-5edc25c0e548 which can be used as unique global reference for Zigzag Hail in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
country KR
microsoft-origin-threat Korea
sector South Korea
Related clusters

To see the related clusters, click here.

ZIRCONIUM

In addition to strengthening generic detection of EoP exploits, Microsoft security researchers are actively gathering threat intelligence and indicators attributable to ZIRCONIUM, the activity group using the CVE-2017-0005 exploit.

Internal MISP references

UUID 2d19c573-252b-49d8-8c2e-3b529b91e72d which can be used as unique global reference for ZIRCONIUM in MISP communities and other software using the MISP galaxy

External references
Associated metadata
Metadata key Value
Related clusters

To see the related clusters, click here.