APT KNOWLEDGE BASE
// THREAT ACTOR PROFILES · MITRE ATT&CK TTPs · TACTICS & TECHNIQUES FOR SOC TRAINING
172 actors ·
Updated: 2026-04-14 06:22 UTC
Source: MITRE ATT&CK STIX/JSON — github.com/mitre/cti
ACTORS BY NATION
TOP 10 TECHNIQUES USED
MOTIVATION BREAKDOWN
GROUPS FIRST ACTIVE (BY ERA)
MITRE ATT&CK Coverage Map
0
172 actors
Click cell → filter actors
/
Operators: ttp:
nation:
sector:
alias:
· Multi-word = AND · Press / to focus
172 actors
MITRE ATT&CK Tactic Reference
Techniques used by profiled actors
Indrik Spider
Evil Corp
Manatee Tempest
DEV-0243
+1 more
Russia
28 techniques
[Indrik Spider](https://attack.mitre.org/groups/G0119) is a Russia-based cybercriminal group that has been active since at least 2014. [Indrik Spider](https://attack.mitre.org/groups/G0119) initially started with the [Dridex](https://attack.mitre.org/software/S0384) banking Trojan, and then by 2017 they began running ransomware operations using [BitPaymer](https://attack.mitre.org/software/S0570),
TARGET SECTORS
MITRE ID: G0119
LuminousMoth
Unknown
24 techniques
[LuminousMoth](https://attack.mitre.org/groups/G1014) is a Chinese-speaking cyber espionage group that has been active since at least October 2020. [LuminousMoth](https://attack.mitre.org/groups/G1014) has targeted high-profile organizations, including government entities, in Myanmar, the Philippines, Thailand, and other parts of Southeast Asia. Some security researchers have concluded there is a
TARGET SECTORS
MITRE ID: G1014
Medusa Group
Unknown
50 techniques
[Medusa Group](https://attack.mitre.org/groups/G1051) has been active since at least 2021 and was initially operated as a closed ransomware group before evolving into a Ransomware-as-a-Service (RaaS) operation. Some reporting indicates that certain attacks may still be conducted directly by the ransomware’s core developers. Public sources have also referred to the group as “Spearwing” or “Medusa A
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1046
Port Scan
T1047
T1057
T1059
Scripting
T1069
T1070
T1071
App Layer C2
T1072
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1105
Tool Transfer
T1106
T1112
T1135
T1136
T1190
Exploit Public App
T1218
T1219
T1486
Ransomware
T1489
T1490
T1505
T1518
T1529
T1543
T1548
T1553
T1559
T1562
T1564
T1567
T1569
T1570
T1573
T1583
T1585
T1588
T1608
T1650
T1652
T1657
MITRE ID: G1051
Wizard Spider
UNC1878
TEMP.MixMaster
Grim Spider
+5 more
Unknown
49 techniques
[Wizard Spider](https://attack.mitre.org/groups/G0102) is a Russia-based financially motivated threat group originally known for the creation and deployment of [TrickBot](https://attack.mitre.org/software/S0266) since at least 2016. [Wizard Spider](https://attack.mitre.org/groups/G0102) possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations,
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1047
T1048
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1082
System Info
T1087
T1105
Tool Transfer
T1112
T1133
T1135
T1136
T1197
T1204
User Execution
T1210
T1218
T1222
T1489
T1490
T1518
T1543
T1547
Boot Autostart
T1550
T1552
T1553
T1555
T1557
T1558
T1560
T1562
T1566
Phishing
T1567
T1569
T1570
T1585
T1588
MITRE ID: G0102
Elderwood
Elderwood Gang
Beijing Group
Sneaky Panda
Unknown
6 techniques
[Elderwood](https://attack.mitre.org/groups/G0066) is a suspected Chinese cyber espionage group that was reportedly responsible for the 2009 Google intrusion known as Operation Aurora. The group has targeted defense organizations, supply chain manufacturers, human rights and nongovernmental organizations (NGOs), and IT service providers.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0066
FIN7
GOLD NIAGARA
ITG14
Carbon Spider
+2 more
Russia
50 techniques
[FIN7](https://attack.mitre.org/groups/G0046) is a financially-motivated threat group that has been active since 2013. [FIN7](https://attack.mitre.org/groups/G0046) has targeted the retail, restaurant, hospitality, software, consulting, financial services, medical equipment, cloud services, media, food and beverage, transportation, pharmaceutical, and utilities industries in the United States. A p
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1005
T1008
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1047
T1053
Scheduled Task
T1057
T1059
Scripting
T1069
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1087
T1091
T1102
T1105
Tool Transfer
T1113
T1124
T1125
T1140
T1190
Exploit Public App
T1195
Supply Chain
T1204
User Execution
T1210
T1218
T1219
T1486
Ransomware
T1497
T1543
T1546
T1547
Boot Autostart
T1553
T1558
T1559
T1562
T1564
T1566
Phishing
T1567
T1569
T1571
T1572
T1583
T1587
T1588
T1591
T1608
T1620
T1674
MITRE ID: G0046
UNC3886
Unknown
35 techniques
[UNC3886](https://attack.mitre.org/groups/G1048) is a China-nexus cyberespionage group that has been active since at least 2022, targeting defense, technology, and telecommunication organizations located in the United States and the Asia-Pacific-Japan (APJ) regions. [UNC3886](https://attack.mitre.org/groups/G1048) has displayed a deep understanding of edge devices and virtualization technologies t
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1008
T1014
T1021
Remote Services
T1027
Obfuscation
T1036
T1037
T1040
T1057
T1059
Scripting
T1068
T1070
T1074
T1078
Valid Accounts
T1083
File Discovery
T1095
T1124
T1190
Exploit Public App
T1203
Exploitation
T1205
T1212
T1218
T1505
T1548
T1554
T1555
T1560
T1562
T1564
T1570
T1587
T1588
T1673
T1675
T1681
MITRE ID: G1048
Velvet Ant
Unknown
21 techniques
[Velvet Ant](https://attack.mitre.org/groups/G1047) is a threat actor operating since at least 2021. [Velvet Ant](https://attack.mitre.org/groups/G1047) is associated with complex persistence mechanisms, the targeting of network devices and appliances during operations, and the use of zero day exploits.
TARGET SECTORS
MITRE ID: G1047
WIRTE
Unknown
10 techniques
[WIRTE](https://attack.mitre.org/groups/G0090) is a threat group that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted government, diplomatic, financial, military, legal, and technology organizations in the Middle East and Europe.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0090
Dragonfly
TEMP.Isotope
DYMALLOY
Berserk Bear
+6 more
Unknown
47 techniques
[Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16. Active since at least 2010, [Dragonfly](https://attack.mitre.org/groups/G0035) has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide thr
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1012
T1016
T1018
T1021
Remote Services
T1033
T1036
T1053
Scheduled Task
T1059
Scripting
T1069
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1083
File Discovery
T1087
T1098
Account Manipulation
T1105
Tool Transfer
T1110
Brute Force
T1112
T1113
T1114
T1133
T1135
T1136
T1187
T1189
T1190
Exploit Public App
T1195
Supply Chain
T1203
Exploitation
T1204
User Execution
T1210
T1221
T1505
T1547
Boot Autostart
T1560
T1562
T1564
T1566
Phishing
T1583
T1584
T1588
T1591
T1595
T1598
T1608
MITRE ID: G0035
OilRig
COBALT GYPSY
IRN2
APT34
+8 more
China
58 techniques
[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to at
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1007
T1008
T1012
T1016
T1021
Remote Services
T1025
T1027
Obfuscation
T1033
T1036
T1046
Port Scan
T1047
T1048
T1049
T1053
Scheduled Task
T1056
Input Capture
T1057
T1059
Scripting
T1068
T1069
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1087
T1105
Tool Transfer
T1110
Brute Force
T1112
T1113
T1115
T1119
T1120
T1133
T1137
T1140
T1195
Supply Chain
T1201
T1203
Exploitation
T1204
User Execution
T1218
T1219
T1497
T1505
T1543
T1552
T1553
T1555
T1556
T1562
T1566
Phishing
T1572
T1573
T1583
T1586
T1587
T1588
T1608
MITRE ID: G0049
Equation
Unknown
4 techniques
[Equation](https://attack.mitre.org/groups/G0020) is a sophisticated threat group that employs multiple remote access tools. The group is known to use zero-day exploits and has developed the capability to overwrite the firmware of hard disk drives.
MITRE ID: G0020
Fox Kitten
UNC757
Parisite
Pioneer Kitten
+2 more
Unknown
31 techniques
[Fox Kitten](https://attack.mitre.org/groups/G0117) is threat actor with a suspected nexus to the Iranian government that has been active since at least 2017 against entities in the Middle East, North Africa, Europe, Australia, and North America. [Fox Kitten](https://attack.mitre.org/groups/G0117) has targeted multiple industrial verticals including oil and gas, technology, government, defense, he
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1012
T1018
T1021
Remote Services
T1027
Obfuscation
T1036
T1039
T1046
Port Scan
T1053
Scheduled Task
T1059
Scripting
T1078
Valid Accounts
T1083
File Discovery
T1087
T1090
Proxy
T1102
T1105
Tool Transfer
T1110
Brute Force
T1136
T1190
Exploit Public App
T1210
T1213
T1217
T1505
T1530
T1546
T1552
T1555
T1560
T1572
T1585
MITRE ID: G0117
Lazarus Group
Labyrinth Chollima
HIDDEN COBRA
Guardians of Peace
+3 more
North Korea
68 techniques
[Lazarus Group](https://attack.mitre.org/groups/G0032) is a North Korean state-sponsored cyber threat group attributed to the Reconnaissance General Bureau (RGB). [Lazarus Group](https://attack.mitre.org/groups/G0032) has been active since at least 2009 and is reportedly responsible for the November 2014 destructive wiper attack on Sony Pictures Entertainment, identified by Novetta as part of Op
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1001
T1005
T1008
T1010
T1012
T1016
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1046
Port Scan
T1047
T1048
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1090
Proxy
T1098
Account Manipulation
T1102
T1104
T1105
Tool Transfer
T1106
T1110
Brute Force
T1124
T1132
T1134
T1140
T1189
T1202
T1203
Exploitation
T1204
User Execution
T1218
T1485
T1489
T1491
T1529
T1542
T1543
T1547
Boot Autostart
T1553
T1557
T1560
T1561
T1562
T1564
T1566
Phishing
T1571
T1573
T1574
T1583
T1584
T1585
T1587
T1588
T1589
T1591
T1620
T1680
MITRE ID: G0032
Aquatic Panda
Unknown
25 techniques
[Aquatic Panda](https://attack.mitre.org/groups/G0143) is a suspected China-based threat group with a dual mission of intelligence collection and industrial espionage. Active since at least May 2020, [Aquatic Panda](https://attack.mitre.org/groups/G0143) has primarily targeted entities in the telecommunications, technology, and government sectors.
TARGET SECTORS
MITRE ID: G0143
Daggerfly
Evasive Panda
BRONZE HIGHLAND
Unknown
17 techniques
[Daggerfly](https://attack.mitre.org/groups/G1034) is a People's Republic of China-linked APT entity active since at least 2012. [Daggerfly](https://attack.mitre.org/groups/G1034) has targeted individuals, government and NGO entities, and telecommunication companies in Asia and Africa. [Daggerfly](https://attack.mitre.org/groups/G1034) is associated with exclusive use of [MgBot](https://attack.mit
TARGET SECTORS
MITRE ID: G1034
TeamTNT
Unknown
42 techniques
[TeamTNT](https://attack.mitre.org/groups/G0139) is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and has mainly focused its efforts on leveraging cloud and container resources to deploy cryptocurrency miners in victim environments.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1007
T1014
T1016
T1021
Remote Services
T1027
Obfuscation
T1036
T1046
Port Scan
T1048
T1049
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1074
T1082
System Info
T1083
File Discovery
T1098
Account Manipulation
T1102
T1105
Tool Transfer
T1120
T1133
T1136
T1140
T1204
User Execution
T1219
T1222
T1496
T1518
T1543
T1547
Boot Autostart
T1552
T1562
T1569
T1583
T1587
T1595
T1608
T1609
T1610
T1611
T1613
T1680
MITRE ID: G0139
TA505
Hive0065
Spandex Tempest
CHIMBORAZO
Russia
24 techniques
[TA505](https://attack.mitre.org/groups/G0092) is a cyber criminal group that has been active since at least 2014. [TA505](https://attack.mitre.org/groups/G0092) is known for frequently changing malware, driving global trends in criminal malware distribution, and ransomware campaigns involving [Clop](https://attack.mitre.org/software/S0611).
TARGET SECTORS
MITRE ID: G0092
Inception
Inception Framework
Cloud Atlas
Unknown
20 techniques
[Inception](https://attack.mitre.org/groups/G0100) is a cyber espionage group active since at least 2014. The group has targeted multiple industries and governmental entities primarily in Russia, but has also been active in the United States and throughout Europe, Asia, Africa, and the Middle East.
TARGET SECTORS
MITRE ID: G0100
admin@338
Unknown
12 techniques
[admin@338](https://attack.mitre.org/groups/G0018) is a China-based cyber threat group. It has previously used newsworthy events as lures to deliver malware and has primarily targeted organizations involved in financial, economic, and trade policy, typically using publicly available RATs such as [PoisonIvy](https://attack.mitre.org/software/S0012), as well as some non-public backdoors.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0018
BlackTech
Palmerworm
Unknown
10 techniques
[BlackTech](https://attack.mitre.org/groups/G0098) is a suspected Chinese cyber espionage group that has primarily targeted organizations in East Asia--particularly Taiwan, Japan, and Hong Kong--and the US since at least 2013. [BlackTech](https://attack.mitre.org/groups/G0098) has used a combination of custom malware, dual-use tools, and living off the land tactics to compromise media, constructio
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0098
APT42
Unknown
27 techniques
[APT42](https://attack.mitre.org/groups/G1044) is an Iranian-sponsored threat group that conducts cyber espionage and surveillance. The group primarily focuses on targets in the Middle East region, but has targeted a variety of industries and countries since at least 2015. [APT42](https://attack.mitre.org/groups/G1044) starts cyber operations through spearphishing emails and/or the PINEFLOWER Andr
TARGET SECTORS
MITRE ID: G1044
Malteiro
Unknown
11 techniques
[Malteiro](https://attack.mitre.org/groups/G1026) is a financially motivated criminal group that is likely based in Brazil and has been active since at least November 2019. The group operates and distributes the [Mispadu](https://attack.mitre.org/software/S1122) banking trojan via a Malware-as-a-Service (MaaS) business model. [Malteiro](https://attack.mitre.org/groups/G1026) mainly targets victim
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1026
Earth Lusca
TAG-22
Charcoal Typhoon
CHROMIUM
+1 more
Unknown
34 techniques
[Earth Lusca](https://attack.mitre.org/groups/G1006) is a suspected China-based cyber espionage group that has been active since at least April 2019. [Earth Lusca](https://attack.mitre.org/groups/G1006) has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Ta
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1007
T1016
T1018
T1027
Obfuscation
T1033
T1036
T1047
T1049
T1053
Scheduled Task
T1057
T1059
Scripting
T1090
Proxy
T1098
Account Manipulation
T1112
T1140
T1189
T1190
Exploit Public App
T1204
User Execution
T1210
T1218
T1482
T1543
T1547
Boot Autostart
T1548
T1560
T1566
Phishing
T1567
T1574
T1583
T1584
T1588
T1595
T1608
MITRE ID: G1006
Play
Unknown
22 techniques
[Play](https://attack.mitre.org/groups/G1040) is a ransomware group that has been active since at least 2022 deploying [Playcrypt](https://attack.mitre.org/software/S1162) ransomware against the business, government, critical infrastructure, healthcare, and media sectors in North America, South America, and Europe. [Play](https://attack.mitre.org/groups/G1040) actors employ a double-extortion mod
TARGET SECTORS
MITRE ID: G1040
Sandworm Team
ELECTRUM
Telebots
IRON VIKING
+7 more
Russia
64 techniques
[Sandworm Team](https://attack.mitre.org/groups/G0034) is a destructive threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) Main Center for Special Technologies (GTsST) military unit 74455. This group has been active since at least 2009.
In October 2020, the US indicted six GRU Unit 74455 officers associated with [Sandworm Team](https://attack.mitre
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1040
T1041
T1047
T1049
T1053
Scheduled Task
T1056
Input Capture
T1059
Scripting
T1070
T1071
App Layer C2
T1072
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1102
T1105
Tool Transfer
T1106
T1132
T1133
T1140
T1190
Exploit Public App
T1195
Supply Chain
T1199
T1203
Exploitation
T1204
User Execution
T1213
T1218
T1219
T1485
T1486
Ransomware
T1489
T1490
T1491
T1499
T1505
T1539
T1555
T1561
T1566
Phishing
T1570
T1571
T1583
T1584
T1585
T1586
T1587
T1588
T1589
T1590
T1591
T1592
T1593
T1594
T1595
T1598
T1608
MITRE ID: G0034
TA577
Unknown
5 techniques
[TA577](https://attack.mitre.org/groups/G1037) is an initial access broker (IAB) that has distributed [QakBot](https://attack.mitre.org/software/S0650) and [Pikabot](https://attack.mitre.org/software/S1145), and was among the first observed groups distributing [Latrodectus](https://attack.mitre.org/software/S1160) in 2023.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1037
Turla
IRON HUNTER
Group 88
Waterbug
+6 more
Unknown
50 techniques
[Turla](https://attack.mitre.org/groups/G0010) is a cyber espionage threat group that has been attributed to Russia's Federal Security Service (FSB). They have compromised victims in over 50 countries since at least 2004, spanning a range of industries including government, embassies, military, education, research and pharmaceutical companies. [Turla](https://attack.mitre.org/groups/G0010) is kno
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1005
T1007
T1012
T1016
T1018
T1021
Remote Services
T1025
T1027
Obfuscation
T1036
T1049
T1055
Process Injection
T1057
T1059
Scripting
T1068
T1069
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1102
T1105
Tool Transfer
T1106
T1110
Brute Force
T1112
T1120
T1124
T1134
T1140
T1189
T1201
T1204
User Execution
T1213
T1518
T1546
T1547
Boot Autostart
T1553
T1555
T1560
T1562
T1564
T1566
Phishing
T1567
T1570
T1583
T1584
T1587
T1588
T1615
MITRE ID: G0010
Suckfly
Unknown
5 techniques
[Suckfly](https://attack.mitre.org/groups/G0039) is a China-based threat group that has been active since at least 2014.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0039
Ember Bear
UNC2589
Bleeding Bear
DEV-0586
+3 more
Unknown
40 techniques
[Ember Bear](https://attack.mitre.org/groups/G1003) is a Russian state-sponsored cyber espionage group that has been active since at least 2020, linked to Russia's General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155). [Ember Bear](https://attack.mitre.org/groups/G1003) has primarily focused operations against Ukrainian government and telecommunication ent
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1018
T1021
Remote Services
T1036
T1046
Port Scan
T1047
T1053
Scheduled Task
T1059
Scripting
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1090
Proxy
T1095
T1110
Brute Force
T1112
T1114
T1119
T1125
T1133
T1190
Exploit Public App
T1195
Supply Chain
T1203
Exploitation
T1210
T1491
T1505
T1550
T1552
T1560
T1561
T1562
T1567
T1570
T1571
T1572
T1583
T1585
T1588
T1595
T1654
MITRE ID: G1003
FIN6
Magecart Group 6
ITG08
Skeleton Spider
+2 more
Unknown
33 techniques
[FIN6](https://attack.mitre.org/groups/G0037) is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces. This group has aggressively targeted and compromised point of sale (PoS) systems in the hospitality and retail sectors.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1018
T1021
Remote Services
T1027
Obfuscation
T1036
T1046
Port Scan
T1047
T1048
T1053
Scheduled Task
T1059
Scripting
T1068
T1070
T1074
T1078
Valid Accounts
T1087
T1095
T1102
T1110
Brute Force
T1119
T1134
T1204
User Execution
T1213
T1547
Boot Autostart
T1553
T1555
T1560
T1562
T1566
Phishing
T1569
T1572
T1573
T1588
MITRE ID: G0037
Silence
Whisper Spider
Unknown
25 techniques
[Silence](https://attack.mitre.org/groups/G0091) is a financially motivated threat actor targeting financial institutions in different countries. The group was first seen in June 2016. Their main targets reside in Russia, Ukraine, Belarus, Azerbaijan, Poland and Kazakhstan. They compromised various banking systems, including the Russian Central Bank's Automated Workstation Client, ATMs, and card p
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1018
T1021
Remote Services
T1027
Obfuscation
T1036
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1070
T1072
T1078
Valid Accounts
T1090
Proxy
T1105
Tool Transfer
T1106
T1112
T1113
T1125
T1204
User Execution
T1218
T1547
Boot Autostart
T1553
T1566
Phishing
T1569
T1571
T1588
MITRE ID: G0091
Patchwork
Hangover Group
Dropping Elephant
Chinastrats
+2 more
Unknown
34 techniques
[Patchwork](https://attack.mitre.org/groups/G0040) is a cyber espionage group that was first observed in December 2015. While the group has not been definitively attributed, circumstantial evidence suggests the group may be a pro-Indian or Indian entity. [Patchwork](https://attack.mitre.org/groups/G0040) has been seen targeting industries related to diplomatic and government agencies. Much of the
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1005
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1070
T1074
T1082
System Info
T1083
File Discovery
T1102
T1105
Tool Transfer
T1112
T1119
T1132
T1189
T1197
T1203
Exploitation
T1204
User Execution
T1518
T1547
Boot Autostart
T1548
T1553
T1555
T1559
T1560
T1566
Phishing
T1574
T1587
T1588
T1598
T1680
MITRE ID: G0040
APT28
IRON TWILIGHT
SNAKEMACKEREL
Swallowtail
+12 more
Russia
71 techniques
[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165. This group has been active since at least 2004.
[APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, an
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1001
T1003
Credential Dumping
T1005
T1014
T1021
Remote Services
T1025
T1027
Obfuscation
T1030
T1036
T1037
T1039
T1040
T1048
T1056
Input Capture
T1057
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1083
File Discovery
T1090
Proxy
T1091
T1092
T1098
Account Manipulation
T1102
T1105
Tool Transfer
T1110
Brute Force
T1113
T1114
T1119
T1120
T1133
T1134
T1137
T1140
T1189
T1190
Exploit Public App
T1199
T1203
Exploitation
T1204
User Execution
T1210
T1211
T1213
T1218
T1221
T1498
T1505
T1528
T1542
T1546
T1547
Boot Autostart
T1550
T1557
T1559
T1560
T1564
T1566
Phishing
T1567
T1573
T1583
T1584
T1586
T1588
T1589
T1591
T1595
T1596
T1598
T1669
MITRE ID: G0007
Aoqin Dragon
Unknown
9 techniques
[Aoqin Dragon](https://attack.mitre.org/groups/G1007) is a suspected Chinese cyber espionage threat group that has been active since at least 2013. [Aoqin Dragon](https://attack.mitre.org/groups/G1007) has primarily targeted government, education, and telecommunication organizations in Australia, Cambodia, Hong Kong, Singapore, and Vietnam. Security researchers noted a potential association betwee
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1007
Cinnamon Tempest
DEV-0401
Emperor Dragonfly
BRONZE STARLIGHT
Unknown
16 techniques
[Cinnamon Tempest](https://attack.mitre.org/groups/G1021) is a China-based threat group that has been active since at least 2021 deploying multiple strains of ransomware based on the leaked [Babuk](https://attack.mitre.org/software/S0638) source code. [Cinnamon Tempest](https://attack.mitre.org/groups/G1021) does not operate their ransomware on an affiliate model or purchase access but appears to
TARGET SECTORS
MITRE ID: G1021
HEXANE
Lyceum
Siamesekitten
Spirlin
Unknown
29 techniques
[HEXANE](https://attack.mitre.org/groups/G1001) is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. [HEXANE](https://attack.mitre.org/groups/G1001)'s TTPs appear si
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1001
Darkhotel
DUBNIUM
Zigzag Hail
Unknown
22 techniques
[Darkhotel](https://attack.mitre.org/groups/G0012) is a suspected South Korean threat group that has targeted victims primarily in East Asia since at least 2004. The group's name is based on cyber espionage operations conducted via hotel Internet networks against traveling executives and other select guests. [Darkhotel](https://attack.mitre.org/groups/G0012) has also conducted spearphishing campai
TARGET SECTORS
MITRE ID: G0012
Ke3chang
APT15
Mirage
Vixen Panda
+5 more
China
37 techniques
[Ke3chang](https://attack.mitre.org/groups/G0004) is a threat group attributed to actors operating out of China. [Ke3chang](https://attack.mitre.org/groups/G0004) has targeted oil, government, diplomatic, military, and NGOs in Central and South America, the Caribbean, Europe, and North America since at least 2010.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1007
T1016
T1018
T1020
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1049
T1056
Input Capture
T1057
T1059
Scripting
T1069
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1105
Tool Transfer
T1114
T1119
T1133
T1140
T1190
Exploit Public App
T1213
T1543
T1547
Boot Autostart
T1558
T1560
T1569
T1583
T1587
T1588
T1614
MITRE ID: G0004
Volt Typhoon
BRONZE SILHOUETTE
Vanguard Panda
DEV-0391
+3 more
Unknown
57 techniques
[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021 primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lat
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1006
T1007
T1010
T1012
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1046
Port Scan
T1047
T1049
T1056
Input Capture
T1057
T1059
Scripting
T1068
T1069
T1070
T1074
T1078
Valid Accounts
T1083
File Discovery
T1087
T1090
Proxy
T1105
Tool Transfer
T1112
T1113
T1120
T1124
T1133
T1140
T1190
Exploit Public App
T1217
T1218
T1497
T1505
T1518
T1552
T1555
T1560
T1570
T1573
T1584
T1587
T1588
T1589
T1590
T1591
T1592
T1593
T1594
T1596
T1614
T1654
T1680
MITRE ID: G1017
Leafminer
Raspite
Unknown
14 techniques
[Leafminer](https://attack.mitre.org/groups/G0077) is an Iranian threat group that has targeted government organizations and business entities in the Middle East since at least early 2017.
TARGET SECTORS
MITRE ID: G0077
Magic Hound
TA453
COBALT ILLUSION
Charming Kitten
+5 more
China
57 techniques
[Magic Hound](https://attack.mitre.org/groups/G0059) is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted European, U.S., and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1056
Input Capture
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1098
Account Manipulation
T1102
T1105
Tool Transfer
T1112
T1113
T1114
T1136
T1189
T1190
Exploit Public App
T1204
User Execution
T1218
T1482
T1486
Ransomware
T1505
T1547
Boot Autostart
T1560
T1562
T1564
T1566
Phishing
T1567
T1570
T1571
T1572
T1573
T1583
T1584
T1585
T1586
T1588
T1589
T1590
T1591
T1592
T1595
T1598
MITRE ID: G0059
APT29
IRON RITUAL
IRON HEMLOCK
NobleBaron
+11 more
Russia
47 techniques
[APT29](https://attack.mitre.org/groups/G0016) is threat group that has been attributed to Russia's Foreign Intelligence Service (SVR). They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. [APT29](https://attack.mitre.org/groups/G0016) reportedly compromised the Democratic National Committee starting
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1021
Remote Services
T1027
Obfuscation
T1036
T1037
T1047
T1053
Scheduled Task
T1059
Scripting
T1068
T1070
T1078
Valid Accounts
T1087
T1090
Proxy
T1098
Account Manipulation
T1105
Tool Transfer
T1110
Brute Force
T1114
T1133
T1136
T1190
Exploit Public App
T1199
T1203
Exploitation
T1204
User Execution
T1218
T1505
T1528
T1546
T1547
Boot Autostart
T1548
T1550
T1553
T1556
T1562
T1566
Phishing
T1568
T1573
T1583
T1586
T1587
T1588
T1595
T1621
T1649
T1651
T1665
MITRE ID: G0016
EXOTIC LILY
Unknown
11 techniques
[EXOTIC LILY](https://attack.mitre.org/groups/G1011) is a financially motivated group that has been closely linked with [Wizard Spider](https://attack.mitre.org/groups/G0102) and the deployment of ransomware including [Conti](https://attack.mitre.org/software/S0575) and [Diavol](https://attack.mitre.org/software/S0659). [EXOTIC LILY](https://attack.mitre.org/groups/G1011) may be acting as an initi
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1011
Cobalt Group
GOLD KINGSWOOD
Cobalt Gang
Cobalt Spider
Unknown
26 techniques
[Cobalt Group](https://attack.mitre.org/groups/G0080) is a financially motivated threat group that has primarily targeted financial institutions since at least 2016. The group has conducted intrusions to steal money via targeting ATM systems, card processing, payment systems and SWIFT systems. [Cobalt Group](https://attack.mitre.org/groups/G0080) has mainly targeted banks in Eastern Europe, Centra
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1021
Remote Services
T1027
Obfuscation
T1037
T1046
Port Scan
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1105
Tool Transfer
T1195
Supply Chain
T1203
Exploitation
T1204
User Execution
T1218
T1219
T1220
T1518
T1543
T1547
Boot Autostart
T1548
T1559
T1566
Phishing
T1572
T1573
T1588
MITRE ID: G0080
Andariel
Silent Chollima
PLUTONIUM
Onyx Sleet
Unknown
12 techniques
[Andariel](https://attack.mitre.org/groups/G0138) is a North Korean state-sponsored threat group that has been active since at least 2009. [Andariel](https://attack.mitre.org/groups/G0138) has primarily focused its operations--which have included destructive attacks--against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cybe
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0138
HAFNIUM
Operation Exchange Marauder
Silk Typhoon
Unknown
37 techniques
[HAFNIUM](https://attack.mitre.org/groups/G0125) is a likely state-sponsored cyber espionage group operating out of China that has been active since at least January 2021. [HAFNIUM](https://attack.mitre.org/groups/G0125) primarily targets entities in the US across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors,
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1018
T1033
T1057
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1083
File Discovery
T1095
T1098
Account Manipulation
T1105
Tool Transfer
T1110
Brute Force
T1114
T1119
T1132
T1136
T1190
Exploit Public App
T1199
T1213
T1218
T1505
T1530
T1550
T1555
T1560
T1564
T1567
T1583
T1584
T1589
T1590
T1592
T1593
MITRE ID: G0125
APT39
ITG07
Chafer
Remix Kitten
China
39 techniques
[APT39](https://attack.mitre.org/groups/G0087) is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. [APT39](https://attack.mitre.org/groups/G0087) has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and acro
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1012
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1046
Port Scan
T1053
Scheduled Task
T1056
Input Capture
T1059
Scripting
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1083
File Discovery
T1090
Proxy
T1102
T1105
Tool Transfer
T1110
Brute Force
T1113
T1115
T1135
T1136
T1140
T1190
Exploit Public App
T1197
T1204
User Execution
T1505
T1546
T1547
Boot Autostart
T1553
T1555
T1560
T1566
Phishing
T1569
T1588
MITRE ID: G0087
MuddyWater
Earth Vetala
MERCURY
Static Kitten
+4 more
Iran
43 techniques
[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS). Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natur
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1016
T1027
Obfuscation
T1033
T1036
T1041
T1047
T1049
T1053
Scheduled Task
T1057
T1059
Scripting
T1071
App Layer C2
T1074
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1102
T1104
T1105
Tool Transfer
T1113
T1132
T1137
T1140
T1190
Exploit Public App
T1203
Exploitation
T1204
User Execution
T1210
T1218
T1219
T1518
T1547
Boot Autostart
T1548
T1552
T1555
T1559
T1560
T1562
T1566
Phishing
T1573
T1574
T1583
T1588
MITRE ID: G0069
APT38
NICKEL GLADSTONE
BeagleBoyz
Bluenoroff
+3 more
China
41 techniques
[APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau. Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at leas
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1005
T1027
Obfuscation
T1033
T1036
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1082
System Info
T1083
File Discovery
T1105
Tool Transfer
T1106
T1110
Brute Force
T1112
T1115
T1135
T1140
T1189
T1204
User Execution
T1217
T1218
T1480
T1485
T1486
Ransomware
T1505
T1518
T1529
T1543
T1548
T1553
T1561
T1562
T1565
T1566
Phishing
T1569
T1583
T1588
MITRE ID: G0082
Transparent Tribe
COPPER FIELDSTONE
APT36
Mythic Leopard
+1 more
China
12 techniques
[Transparent Tribe](https://attack.mitre.org/groups/G0134) is a suspected Pakistan-based threat group that has been active since at least 2013, primarily targeting diplomatic, defense, and research organizations in India and Afghanistan.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0134
APT32
SeaLotus
OceanLotus
APT-C-00
+2 more
China
54 techniques
[APT32](https://attack.mitre.org/groups/G0050) is a suspected Vietnam-based threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well as foreign governments, dissidents, and journalists with a strong focus on Southeast Asian countries like Vietnam, the Philippines, Laos, and Cambodia. They have extensively used strategic web compromise
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1012
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1046
Port Scan
T1047
T1048
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1072
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1102
T1105
Tool Transfer
T1112
T1135
T1137
T1189
T1203
Exploitation
T1204
User Execution
T1216
T1218
T1222
T1505
T1543
T1547
Boot Autostart
T1550
T1552
T1560
T1564
T1566
Phishing
T1569
T1570
T1571
T1574
T1583
T1585
T1588
T1589
T1598
T1608
MITRE ID: G0050
BRONZE BUTLER
REDBALDKNIGHT
Tick
China
33 techniques
[BRONZE BUTLER](https://attack.mitre.org/groups/G0060) is a cyber espionage group with likely Chinese origins that has been active since at least 2008. The group primarily targets Japanese organizations, particularly those in government, biotechnology, electronics manufacturing, and industrial chemistry.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1007
T1018
T1027
Obfuscation
T1036
T1039
T1053
Scheduled Task
T1059
Scripting
T1070
T1071
App Layer C2
T1080
T1083
File Discovery
T1087
T1102
T1105
Tool Transfer
T1113
T1124
T1132
T1140
T1189
T1203
Exploitation
T1204
User Execution
T1518
T1547
Boot Autostart
T1548
T1550
T1560
T1562
T1566
Phishing
T1573
T1574
T1588
MITRE ID: G0060
POLONIUM
Plaid Rain
Unknown
7 techniques
[POLONIUM](https://attack.mitre.org/groups/G1005) is a Lebanon-based group that has primarily targeted Israeli organizations, including critical manufacturing, information technology, and defense industry companies, since at least February 2022. Security researchers assess [POLONIUM](https://attack.mitre.org/groups/G1005) has coordinated their operations with multiple actors affiliated with Iran’s
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1005
APT5
Mulberry Typhoon
MANGANESE
BRONZE FLEETWOOD
+2 more
Unknown
22 techniques
[APT5](https://attack.mitre.org/groups/G1023) is a China-based espionage actor that has been active since at least 2007 primarily targeting the telecommunications, aerospace, and defense industries throughout the U.S., Europe, and Asia. [APT5](https://attack.mitre.org/groups/G1023) has displayed advanced tradecraft and significant interest in compromising networking devices and their underlying so
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1023
BackdoorDiplomacy
Unknown
13 techniques
[BackdoorDiplomacy](https://attack.mitre.org/groups/G0135) is a cyber espionage threat group that has been active since at least 2017. [BackdoorDiplomacy](https://attack.mitre.org/groups/G0135) has targeted Ministries of Foreign Affairs and telecommunication companies in Africa, Europe, the Middle East, and Asia.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0135
Kimsuky
Black Banshee
Velvet Chollima
Emerald Sleet
+4 more
North Korea
72 techniques
[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sec
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1007
T1012
T1016
T1021
Remote Services
T1027
Obfuscation
T1036
T1040
T1041
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1098
Account Manipulation
T1102
T1105
Tool Transfer
T1111
T1112
T1113
T1114
T1133
T1136
T1140
T1176
T1185
T1190
Exploit Public App
T1204
User Execution
T1205
T1218
T1219
T1505
T1518
T1534
T1539
T1543
T1546
T1547
Boot Autostart
T1550
T1552
T1553
T1555
T1557
T1560
T1562
T1564
T1566
Phishing
T1567
T1583
T1584
T1585
T1586
T1587
T1588
T1589
T1591
T1593
T1594
T1596
T1598
T1608
T1620
T1656
T1657
T1680
MITRE ID: G0094
Leviathan
MUDCARP
Kryptonite Panda
Gadolinium
+5 more
China
37 techniques
[Leviathan](https://attack.mitre.org/groups/G0065) is a Chinese state-sponsored cyber espionage group that has been attributed to the Ministry of State Security's (MSS) Hainan State Security Department and an affiliated front company. Active since at least 2009, [Leviathan](https://attack.mitre.org/groups/G0065) has targeted the following sectors: academia, aerospace/aviation, biomedical, defense
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1021
Remote Services
T1027
Obfuscation
T1041
T1047
T1055
Process Injection
T1059
Scripting
T1074
T1078
Valid Accounts
T1090
Proxy
T1102
T1105
Tool Transfer
T1133
T1140
T1189
T1190
Exploit Public App
T1197
T1203
Exploitation
T1204
User Execution
T1218
T1505
T1534
T1546
T1547
Boot Autostart
T1553
T1559
T1560
T1566
Phishing
T1567
T1572
T1583
T1584
T1585
T1586
T1587
T1589
T1595
MITRE ID: G0065
Storm-1811
Unknown
25 techniques
[Storm-1811](https://attack.mitre.org/groups/G1046) is a financially-motivated entity linked to [Black Basta](https://attack.mitre.org/software/S1070) ransomware deployment. [Storm-1811](https://attack.mitre.org/groups/G1046) is notable for unique phishing and social engineering mechanisms for initial access, such as overloading victim email inboxes with non-malicious spam to prompt a fake "help d
TARGET SECTORS
MITRE ID: G1046
Ajax Security Team
Operation Woolen-Goldfish
AjaxTM
Rocket Kitten
+2 more
Unknown
5 techniques
[Ajax Security Team](https://attack.mitre.org/groups/G0130) is a group that has been active since at least 2010 and believed to be operating out of Iran. By 2014 [Ajax Security Team](https://attack.mitre.org/groups/G0130) transitioned from website defacement operations to malware-based cyber espionage campaigns targeting the US defense industrial base and Iranian users of anti-censorship technolog
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0130
Akira
GOLD SAHARA
PUNK SPIDER
Howling Scorpius
Unknown
17 techniques
[Akira](https://attack.mitre.org/groups/G1024) is a ransomware variant and ransomware deployment entity active since at least March 2023. [Akira](https://attack.mitre.org/groups/G1024) uses compromised credentials to access single-factor external access mechanisms such as VPNs for initial access, then various publicly-available tools and techniques for lateral movement. [Akira](https://attack.mitr
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1024
Mustang Panda
TA416
RedDelta
BRONZE PRESIDENT
+11 more
Unknown
61 techniques
[Mustang Panda](https://attack.mitre.org/groups/G0129) is a China-based cyber espionage threat actor that has been conducting operations since at least 2012. [Mustang Panda](https://attack.mitre.org/groups/G0129) has been known to use tailored phishing lures and decoy documents to deliver malicious payloads. [Mustang Panda](https://attack.mitre.org/groups/G0129) has targeted government, diplomati
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1001
T1003
Credential Dumping
T1016
T1018
T1027
Obfuscation
T1036
T1041
T1046
Port Scan
T1047
T1048
T1049
T1052
T1053
Scheduled Task
T1057
T1059
Scripting
T1069
T1070
T1071
App Layer C2
T1072
T1074
T1082
System Info
T1083
File Discovery
T1087
T1091
T1095
T1102
T1105
Tool Transfer
T1106
T1119
T1129
T1140
T1176
T1203
Exploitation
T1204
User Execution
T1205
T1218
T1219
T1505
T1518
T1546
T1547
Boot Autostart
T1553
T1557
T1560
T1564
T1566
Phishing
T1567
T1572
T1573
T1574
T1583
T1585
T1586
T1587
T1588
T1593
T1598
T1608
T1622
T1654
T1678
MITRE ID: G0129
LAPSUS$
DEV-0537
Strawberry Tempest
Unknown
32 techniques
[LAPSUS$](https://attack.mitre.org/groups/G1004) is cyber criminal threat group that has been active since at least mid-2021. [LAPSUS$](https://attack.mitre.org/groups/G1004) specializes in large-scale social engineering and extortion operations, including destructive attacks without the use of ransomware. The group has targeted organizations globally, including in the government, manufacturing, h
TARGET SECTORS
MITRE ID: G1004
Chimera
Unknown
48 techniques
[Chimera](https://attack.mitre.org/groups/G0114) is a suspected China-based threat group that has been active since at least 2018 targeting the semiconductor industry in Taiwan as well as data from the airline industry.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1007
T1012
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1039
T1041
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1057
T1059
Scripting
T1069
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1083
File Discovery
T1087
T1105
Tool Transfer
T1106
T1110
Brute Force
T1111
T1114
T1119
T1124
T1133
T1135
T1201
T1213
T1217
T1482
T1550
T1556
T1560
T1567
T1569
T1570
T1572
T1574
T1588
T1589
T1680
MITRE ID: G0114
TA2541
Unknown
20 techniques
[TA2541](https://attack.mitre.org/groups/G1018) is a cybercriminal group that has been targeting the aviation, aerospace, transportation, manufacturing, and defense industries since at least 2017. [TA2541](https://attack.mitre.org/groups/G1018) campaigns are typically high volume and involve the use of commodity remote access tools obfuscated by crypters and themes related to aviation, transportat
TARGET SECTORS
MITRE ID: G1018
ToddyCat
Unknown
24 techniques
[ToddyCat](https://attack.mitre.org/groups/G1022) is a sophisticated threat group that has been active since at least 2020 using custom loaders and malware in multi-stage infection chains against government and military targets across Europe and Asia.
TARGET SECTORS
MITRE ID: G1022
BITTER
T-APT-17
Unknown
16 techniques
[BITTER](https://attack.mitre.org/groups/G1002) is a suspected South Asian cyber espionage threat group that has been active since at least 2013. [BITTER](https://attack.mitre.org/groups/G1002) has targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.
TARGET SECTORS
MITRE ID: G1002
RTM
Unknown
7 techniques
[RTM](https://attack.mitre.org/groups/G0048) is a cybercriminal group that has been active since at least 2015 and is primarily interested in users of remote banking systems in Russia and neighboring countries. The group uses a Trojan by the same name ([RTM](https://attack.mitre.org/software/S0148)).
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0048
menuPass
Cicada
POTASSIUM
Stone Panda
+5 more
China
37 techniques
[menuPass](https://attack.mitre.org/groups/G0045) is a threat group that has been active since at least 2006. Individual members of [menuPass](https://attack.mitre.org/groups/G0045) are known to have acted in association with the Chinese Ministry of State Security's (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.
[menuPass](https:/
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1036
T1039
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1059
Scripting
T1070
T1074
T1078
Valid Accounts
T1083
File Discovery
T1087
T1090
Proxy
T1105
Tool Transfer
T1106
T1119
T1140
T1190
Exploit Public App
T1199
T1204
User Execution
T1210
T1218
T1553
T1560
T1566
Phishing
T1568
T1574
T1583
T1588
MITRE ID: G0045
Storm-0501
Unknown
34 techniques
[Storm-0501](https://attack.mitre.org/groups/G1053) is a financially motivated cyber criminal group that uses commodity and open-source tools to conduct ransomware operations. [Storm-0501](https://attack.mitre.org/groups/G1053) has been active since 2021 and has previously been affiliated with Sabbath Ransomware and other Ransomware-as-a-Service (RaaS) variants such as Hive, [BlackCat](https://att
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1021
Remote Services
T1027
Obfuscation
T1036
T1053
Scheduled Task
T1057
T1059
Scripting
T1078
Valid Accounts
T1082
System Info
T1087
T1098
Account Manipulation
T1110
Brute Force
T1190
Exploit Public App
T1218
T1219
T1482
T1484
T1485
T1486
Ransomware
T1490
T1518
T1526
T1530
T1537
T1552
T1555
T1556
T1567
T1578
T1580
T1587
T1588
T1614
T1657
MITRE ID: G1053
Tropic Trooper
Pirate Panda
KeyBoy
Unknown
35 techniques
[Tropic Trooper](https://attack.mitre.org/groups/G0081) is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, and Hong Kong. [Tropic Trooper](https://attack.mitre.org/groups/G0081) focuses on targeting government, healthcare, transportation, and high-tech industries and has been active since 2011.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1016
T1020
T1027
Obfuscation
T1033
T1036
T1046
Port Scan
T1049
T1052
T1055
Process Injection
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1091
T1105
Tool Transfer
T1106
T1119
T1132
T1135
T1140
T1203
Exploitation
T1204
User Execution
T1221
T1505
T1518
T1543
T1547
Boot Autostart
T1564
T1566
Phishing
T1573
T1574
T1680
MITRE ID: G0081
Mustard Tempest
DEV-0206
TA569
GOLD PRELUDE
+1 more
Unknown
9 techniques
[Mustard Tempest](https://attack.mitre.org/groups/G1020) is an initial access broker that has operated the [SocGholish](https://attack.mitre.org/software/S1124) distribution network since at least 2017. [Mustard Tempest](https://attack.mitre.org/groups/G1020) has partnered with [Indrik Spider](https://attack.mitre.org/groups/G0119) to provide access for the download of additional malware including
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1020
APT19
Codoso
C0d0so0
Codoso Team
+1 more
China
18 techniques
[APT19](https://attack.mitre.org/groups/G0073) is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services. In 2017, a phishing campaign was used to target seven law and investment firms. Some analysts track [APT19](https://attack.mitre.org/groups/G0073) a
TARGET SECTORS
MITRE ID: G0073
Moses Staff
DEV-0500
Marigold Sandstorm
Unknown
12 techniques
[Moses Staff](https://attack.mitre.org/groups/G1009) is a suspected Iranian threat group that has primarily targeted Israeli companies since at least September 2021. [Moses Staff](https://attack.mitre.org/groups/G1009) openly stated their motivation in attacking Israeli companies is to cause damage by leaking stolen sensitive data and encrypting the victim's networks without a ransom demand.
Sec
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1009
Molerats
Operation Molerats
Gaza Cybergang
Unknown
12 techniques
[Molerats](https://attack.mitre.org/groups/G0021) is an Arabic-speaking, politically-motivated threat group that has been operating since 2012. The group's victims have primarily been in the Middle East, Europe, and the United States.
TARGET SECTORS
MITRE ID: G0021
Stealth Falcon
Unknown
13 techniques
[Stealth Falcon](https://attack.mitre.org/groups/G0038) is a threat group that has conducted targeted spyware attacks against Emirati journalists, activists, and dissidents since at least 2012. Circumstantial evidence suggests there could be a link between this group and the United Arab Emirates (UAE) government, but that has not been confirmed.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0038
DarkVishnya
Unknown
10 techniques
[DarkVishnya](https://attack.mitre.org/groups/G0105) is a financially motivated threat actor targeting financial institutions in Eastern Europe. In 2017-2018 the group attacked at least 8 banks in this region.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0105
APT37
InkySquid
ScarCruft
Reaper
+3 more
China
25 techniques
[APT37](https://attack.mitre.org/groups/G0067) is a North Korean state-sponsored cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. [APT37](https://attack.mitre.org/groups/G0067) has also been linked to the following cam
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0067
Threat Group-1314
TG-1314
Unknown
4 techniques
[Threat Group-1314](https://attack.mitre.org/groups/G0028) is an unattributed threat group that has used compromised credentials to log into a victim's remote access infrastructure.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0028
APT41
Wicked Panda
Brass Typhoon
BARIUM
China
66 techniques
[APT41](https://attack.mitre.org/groups/G0096) is a threat group that researchers have assessed as Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, [APT41](https://attack.mitre.org/groups/G0096) has been observed targeting various industries, including but not limited to healthcare, telecom, technology, finance, education, ret
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1008
T1012
T1014
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1030
T1033
T1036
T1037
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1059
Scripting
T1069
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1098
Account Manipulation
T1102
T1104
T1105
Tool Transfer
T1110
Brute Force
T1112
T1133
T1135
T1136
T1190
Exploit Public App
T1195
Supply Chain
T1197
T1203
Exploitation
T1213
T1218
T1480
T1484
T1486
Ransomware
T1496
T1542
T1543
T1546
T1547
Boot Autostart
T1550
T1553
T1555
T1560
T1562
T1566
Phishing
T1568
T1569
T1570
T1574
T1588
T1595
T1596
T1599
T1656
MITRE ID: G0096
INC Ransom
GOLD IONIC
Unknown
25 techniques
[INC Ransom](https://attack.mitre.org/groups/G1032) is a ransomware and data extortion threat group associated with the deployment of [INC Ransomware](https://attack.mitre.org/software/S1139) that has been active since at least July 2023. [INC Ransom](https://attack.mitre.org/groups/G1032) has targeted organizations worldwide most commonly in the industrial, healthcare, and education sectors in t
TARGET SECTORS
MITRE ID: G1032
FIN13
Elephant Beetle
Unknown
42 techniques
[FIN13](https://attack.mitre.org/groups/G1016) is a financially motivated cyber threat group that has targeted the financial, retail, and hospitality industries in Mexico and Latin America, as early as 2016. [FIN13](https://attack.mitre.org/groups/G1016) achieves its objectives by stealing intellectual property, financial data, mergers and acquisition information, or PII.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1021
Remote Services
T1036
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1056
Input Capture
T1059
Scripting
T1069
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1098
Account Manipulation
T1105
Tool Transfer
T1133
T1134
T1135
T1136
T1140
T1190
Exploit Public App
T1505
T1547
Boot Autostart
T1550
T1552
T1556
T1560
T1564
T1565
T1572
T1574
T1587
T1588
T1589
T1590
T1657
MITRE ID: G1016
Group5
Unknown
4 techniques
[Group5](https://attack.mitre.org/groups/G0043) is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. [Group5](https://attack.mitre.org/groups/G0043) has used two commonly available remote access tools (RATs), [nj
MITRE ID: G0043
PLATINUM
Unknown
10 techniques
[PLATINUM](https://attack.mitre.org/groups/G0068) is an activity group that has targeted victims since at least 2009. The group has focused on targets associated with governments and related organizations in South and Southeast Asia.
TARGET SECTORS
MITRE ID: G0068
GALLIUM
Granite Typhoon
Unknown
27 techniques
[GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. This group is particularly known for launching Operation Soft Cell, a long-term
TARGET SECTORS
MITRE ID: G0093
FIN10
Unknown
9 techniques
[FIN10](https://attack.mitre.org/groups/G0051) is a financially motivated threat group that has targeted organizations in North America since at least 2013 through 2016. The group uses stolen data exfiltrated from victims to extort organizations.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0051
Winnti Group
Blackfly
China
6 techniques
[Winnti Group](https://attack.mitre.org/groups/G0044) is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting. Some reporting suggests a number of other groups, including [Axiom](https://attack.mitre.org/groups/G0001), [APT17](https://attack.mitre.org/groups/G0025), and
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0044
FIN8
Syssphinx
Unknown
30 techniques
[FIN8](https://attack.mitre.org/groups/G0061) is a financially motivated threat group that has been active since at least January 2016, and known for targeting organizations in the hospitality, retail, entertainment, insurance, technology, chemical, and financial sectors. In June 2021, security researchers detected [FIN8](https://attack.mitre.org/groups/G0061) switching from targeting point-of-sal
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1047
T1048
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1082
System Info
T1102
T1105
Tool Transfer
T1112
T1134
T1204
User Execution
T1482
T1486
Ransomware
T1518
T1546
T1560
T1566
Phishing
T1573
T1588
MITRE ID: G0061
Rocke
Unknown
28 techniques
[Rocke](https://attack.mitre.org/groups/G0106) is an alleged Chinese-speaking adversary whose primary objective appeared to be cryptojacking, or stealing victim system resources for the purposes of mining cryptocurrency. The name [Rocke](https://attack.mitre.org/groups/G0106) comes from the email address "rocke@live.cn" used to create the wallet which held collected cryptocurrency. Researchers hav
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1014
T1018
T1021
Remote Services
T1027
Obfuscation
T1036
T1037
T1046
Port Scan
T1053
Scheduled Task
T1055
Process Injection
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1082
System Info
T1102
T1105
Tool Transfer
T1140
T1190
Exploit Public App
T1222
T1496
T1518
T1543
T1547
Boot Autostart
T1552
T1562
T1564
T1571
T1574
MITRE ID: G0106
RedEcho
Unknown
5 techniques
[RedEcho](https://attack.mitre.org/groups/G1042) is a People’s Republic of China-related threat actor associated with long-running intrusions in Indian critical infrastructure entities. [RedEcho](https://attack.mitre.org/groups/G1042) overlaps with various other PRC-linked threat groups, such as [APT41](https://attack.mitre.org/groups/G0096), and is linked to [ShadowPad](https://attack.mitre.org/s
MITRE ID: G1042
Saint Bear
Storm-0587
TA471
UAC-0056
+1 more
Unknown
13 techniques
[Saint Bear](https://attack.mitre.org/groups/G1031) is a Russian-nexus threat actor active since early 2021, primarily targeting entities in Ukraine and Georgia. The group is notable for a specific remote access tool, [Saint Bot](https://attack.mitre.org/software/S1018), and information stealer, [OutSteel](https://attack.mitre.org/software/S1017) in campaigns. [Saint Bear](https://attack.mitre.org
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1031
Scattered Spider
Roasted 0ktapus
Octo Tempest
Storm-0875
+1 more
Unknown
50 techniques
[Scattered Spider](https://attack.mitre.org/groups/G1015) is a native English-speaking cybercriminal group active since at least 2022. The group initially targeted customer relationship management (CRM) providers, business process outsourcing (BPO) firms, and telecommunications and technology companies before expanding in 2023 to gaming, hospitality, retail, managed service provider (MSP), manuf
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1006
T1016
T1018
T1021
Remote Services
T1041
T1059
Scripting
T1068
T1069
T1070
T1074
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1098
Account Manipulation
T1105
Tool Transfer
T1114
T1133
T1136
T1204
User Execution
T1213
T1217
T1219
T1484
T1486
Ransomware
T1490
T1530
T1538
T1539
T1543
T1552
T1553
T1555
T1556
T1562
T1564
T1567
T1572
T1578
T1580
T1583
T1585
T1588
T1589
T1598
T1621
T1656
T1657
MITRE ID: G1015
CURIUM
Crimson Sandstorm
TA456
Tortoise Shell
+1 more
Unknown
15 techniques
[CURIUM](https://attack.mitre.org/groups/G1012) is an Iranian threat group, first reported in September 2019 and active since at least July 2018, targeting IT service providers in the Middle East. [CURIUM](https://attack.mitre.org/groups/G1012) has since invested in building relationships with potential targets via social media over a period of months to establish trust and confidence before sendi
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1012
Windigo
Unknown
7 techniques
The [Windigo](https://attack.mitre.org/groups/G0124) group has been operating since at least 2011, compromising thousands of Linux and Unix servers using the [Ebury](https://attack.mitre.org/software/S0377) SSH backdoor to create a spam botnet. Despite law enforcement intervention against the creators, [Windigo](https://attack.mitre.org/groups/G0124) operators continued updating [Ebury](https://at
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0124
Blue Mockingbird
Unknown
19 techniques
[Blue Mockingbird](https://attack.mitre.org/groups/G0108) is a cluster of observed activity involving Monero cryptocurrency-mining payloads in dynamic-link library (DLL) form on Windows systems. The earliest observed Blue Mockingbird tools were created in December 2019.
TARGET SECTORS
MITRE ID: G0108
RedCurl
Unknown
32 techniques
[RedCurl](https://attack.mitre.org/groups/G1039) is a threat actor active since 2018 notable for corporate espionage targeting a variety of locations, including Ukraine, Canada and the United Kingdom, and a variety of industries, including but not limited to travel agencies, insurance companies, and banks. [RedCurl](https://attack.mitre.org/groups/G1039) is allegedly a Russian-speaking threat acto
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1020
T1027
Obfuscation
T1036
T1039
T1046
Port Scan
T1053
Scheduled Task
T1056
Input Capture
T1059
Scripting
T1070
T1071
App Layer C2
T1080
T1082
System Info
T1083
File Discovery
T1087
T1102
T1114
T1119
T1199
T1202
T1204
User Execution
T1218
T1537
T1547
Boot Autostart
T1552
T1555
T1560
T1564
T1566
Phishing
T1573
T1587
MITRE ID: G1039
FIN4
Unknown
9 techniques
[FIN4](https://attack.mitre.org/groups/G0085) is a financially-motivated threat group that has targeted confidential information related to the public financial market, particularly regarding healthcare and pharmaceutical companies, since at least 2013. [FIN4](https://attack.mitre.org/groups/G0085) is unique in that they do not infect victims with typical persistent malware, but rather they focus
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0085
Contagious Interview
DeceptiveDevelopment
Gwisin Gang
Tenacious Pungsan
+3 more
Unknown
33 techniques
[Contagious Interview](https://attack.mitre.org/groups/G1052) is a North Korea–aligned threat group active since 2023. The group conducts both cyberespionage and financially motivated operations, including the theft of cryptocurrency and user credentials. [Contagious Interview](https://attack.mitre.org/groups/G1052) targets Windows, Linux, and macOS systems, with a particular focus on individuals
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1027
Obfuscation
T1036
T1041
T1048
T1059
Scripting
T1070
T1071
App Layer C2
T1082
System Info
T1083
File Discovery
T1090
Proxy
T1204
User Execution
T1219
T1480
T1497
T1543
T1546
T1547
Boot Autostart
T1555
T1562
T1566
Phishing
T1567
T1571
T1573
T1583
T1585
T1587
T1588
T1589
T1593
T1608
T1656
T1657
T1681
MITRE ID: G1052
Gorgon Group
Unknown
12 techniques
[Gorgon Group](https://attack.mitre.org/groups/G0078) is a threat group consisting of members who are suspected to be Pakistan-based or have other connections to Pakistan. The group has performed a mix of criminal and targeted attacks, including campaigns against government organizations in the United Kingdom, Spain, Russia, and the United States.
TARGET SECTORS
MITRE ID: G0078
Sidewinder
T-APT-04
Rattlesnake
Unknown
23 techniques
[Sidewinder](https://attack.mitre.org/groups/G0121) is a suspected Indian threat actor group that has been active since at least 2012. They have been observed targeting government, military, and business entities throughout Asia, primarily focusing on Pakistan, China, Nepal, and Afghanistan.
TARGET SECTORS
MITRE ID: G0121
Higaisa
Unknown
24 techniques
[Higaisa](https://attack.mitre.org/groups/G0126) is a threat group suspected to have South Korean origins. [Higaisa](https://attack.mitre.org/groups/G0126) has targeted government, public, and trade organizations in North Korea; however, they have also carried out attacks in China, Japan, Russia, Poland, and other nations. [Higaisa](https://attack.mitre.org/groups/G0126) was first disclosed in ear
TARGET SECTORS
MITRE ID: G0126
APT30
China
2 techniques
[APT30](https://attack.mitre.org/groups/G0013) is a threat group suspected to be associated with the Chinese government. While [Naikon](https://attack.mitre.org/groups/G0019) shares some characteristics with [APT30](https://attack.mitre.org/groups/G0013), the two groups do not appear to be exact matches.
MITRE ID: G0013
Windshift
Bahamut
Unknown
14 techniques
[Windshift](https://attack.mitre.org/groups/G0112) is a threat group that has been active since at least 2017, targeting specific individuals for surveillance in government departments and critical infrastructure across the Middle East.
TARGET SECTORS
MITRE ID: G0112
Confucius
Confucius APT
Unknown
16 techniques
[Confucius](https://attack.mitre.org/groups/G0142) is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between [Confucius](https://attack.mitre.org/groups/G0142) and [Patchwork](https://attack.mitre.org/groups/G0040), part
TARGET SECTORS
MITRE ID: G0142
BlackByte
Hecamede
Unknown
43 techniques
[BlackByte](https://attack.mitre.org/groups/G1043) is a ransomware threat actor operating since at least 2021. [BlackByte](https://attack.mitre.org/groups/G1043) is associated with several versions of ransomware also labeled [BlackByte Ransomware](https://attack.mitre.org/software/S1180). [BlackByte](https://attack.mitre.org/groups/G1043) ransomware operations initially used a common encryption ke
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1012
T1016
T1018
T1021
Remote Services
T1036
T1041
T1046
Port Scan
T1047
T1053
Scheduled Task
T1055
Process Injection
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1078
Valid Accounts
T1082
System Info
T1087
T1105
Tool Transfer
T1112
T1134
T1135
T1136
T1140
T1190
Exploit Public App
T1219
T1480
T1482
T1486
Ransomware
T1490
T1491
T1505
T1518
T1543
T1547
Boot Autostart
T1560
T1562
T1567
T1569
T1570
T1583
T1608
T1614
MITRE ID: G1043
Threat Group-3390
Earth Smilodon
TG-3390
Emissary Panda
+5 more
Unknown
47 techniques
[Threat Group-3390](https://attack.mitre.org/groups/G0027) is a Chinese threat group that has extensively used strategic Web compromises to target victims. The group has been active since at least 2010 and has targeted organizations in the aerospace, government, defense, technology, energy, manufacturing and gambling/betting sectors.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1012
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1030
T1033
T1046
Port Scan
T1047
T1049
T1053
Scheduled Task
T1055
Process Injection
T1056
Input Capture
T1059
Scripting
T1068
T1070
T1071
App Layer C2
T1074
T1078
Valid Accounts
T1087
T1105
Tool Transfer
T1112
T1119
T1133
T1140
T1189
T1190
Exploit Public App
T1195
Supply Chain
T1199
T1203
Exploitation
T1204
User Execution
T1210
T1505
T1543
T1547
Boot Autostart
T1548
T1555
T1560
T1562
T1566
Phishing
T1567
T1574
T1583
T1588
T1608
MITRE ID: G0027
Tonto Team
Earth Akhlut
BRONZE HUNTLEY
CactusPete
+1 more
Unknown
14 techniques
[Tonto Team](https://attack.mitre.org/groups/G0131) is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Taiwan, and the United States since at least 2009; by 2020 they expanded operations to include other Asian as well as Eastern European countries. [Tonto Team](https://attack.mitre.org/groups/G0131) has targeted government, military,
TARGET SECTORS
MITRE ID: G0131
Gamaredon Group
IRON TILDEN
Primitive Bear
ACTINIUM
+4 more
Unknown
55 techniques
[Gamaredon Group](https://attack.mitre.org/groups/G0047) is a suspected Russian cyber espionage group that has targeted military, law enforcement, judiciary, non-profit, and non-governmental organizations in Ukraine since at least 2013. The name [Gamaredon Group](https://attack.mitre.org/groups/G0047) derives from a misspelling of the word "Armageddon," found in early campaigns.
In November 2021,
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1001
T1005
T1012
T1016
T1020
T1021
Remote Services
T1025
T1027
Obfuscation
T1033
T1036
T1039
T1041
T1047
T1053
Scheduled Task
T1055
Process Injection
T1057
T1059
Scripting
T1070
T1071
App Layer C2
T1080
T1082
System Info
T1083
File Discovery
T1090
Proxy
T1091
T1095
T1102
T1105
Tool Transfer
T1106
T1112
T1113
T1119
T1120
T1137
T1140
T1204
User Execution
T1218
T1221
T1480
T1491
T1497
T1518
T1534
T1547
Boot Autostart
T1559
T1561
T1562
T1564
T1566
Phishing
T1568
T1571
T1583
T1587
T1588
T1608
T1620
MITRE ID: G0047
Agrius
Pink Sandstorm
AMERICIUM
Agonizing Serpens
+1 more
Unknown
20 techniques
[Agrius](https://attack.mitre.org/groups/G1030) is an Iranian threat actor active since 2020 notable for a series of ransomware and wiper operations in the Middle East, with an emphasis on Israeli targets. Public reporting has linked [Agrius](https://attack.mitre.org/groups/G1030) to Iran's Ministry of Intelligence and Security (MOIS).
TARGET SECTORS
MITRE ID: G1030
Sea Turtle
Teal Kurma
Marbled Dust
Cosmic Wolf
+1 more
Unknown
22 techniques
[Sea Turtle](https://attack.mitre.org/groups/G1041) is a Türkiye-linked threat actor active since at least 2017 performing espionage and service provider compromise operations against victims in Asia, Europe, and North America. [Sea Turtle](https://attack.mitre.org/groups/G1041) is notable for targeting registrars managing ccTLDs and complex DNS-based intrusions where the threat actor compromised
TARGET SECTORS
MITRE ID: G1041
Rancor
Unknown
8 techniques
[Rancor](https://attack.mitre.org/groups/G0075) is a threat group that has led targeted campaigns against the South East Asia region. [Rancor](https://attack.mitre.org/groups/G0075) uses politically-motivated lures to entice victims to open malicious documents.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0075
Moonstone Sleet
Storm-1789
Unknown
23 techniques
[Moonstone Sleet](https://attack.mitre.org/groups/G1036) is a North Korean-linked threat actor executing both financially motivated attacks and espionage operations. The group previously overlapped significantly with another North Korean-linked entity, [Lazarus Group](https://attack.mitre.org/groups/G0032), but has differentiated its tradecraft since 2023. [Moonstone Sleet](https://attack.mitre.or
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1036
TA551
GOLD CABIN
Shathak
Unknown
11 techniques
[TA551](https://attack.mitre.org/groups/G0127) is a financially-motivated threat group that has been active since at least 2018. The group has primarily targeted English, German, Italian, and Japanese speakers through email-based malware distribution campaigns.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0127
Salt Typhoon
Unknown
14 techniques
[Salt Typhoon](https://attack.mitre.org/groups/G1045) is a People's Republic of China (PRC) state-backed actor that has been active since at least 2019 and responsible for numerous compromises of network infrastructure at major U.S. telecommunication and internet service providers (ISP).
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1045
Axiom
Group 72
Unknown
15 techniques
[Axiom](https://attack.mitre.org/groups/G0001) is a suspected Chinese cyber espionage group that has targeted the aerospace, defense, government, manufacturing, and media sectors since at least 2008. Some reporting suggests a degree of overlap between [Axiom](https://attack.mitre.org/groups/G0001) and [Winnti Group](https://attack.mitre.org/groups/G0044) but the two groups appear to be distinct ba
TARGET SECTORS
MITRE ID: G0001
Dark Caracal
Unknown
11 techniques
[Dark Caracal](https://attack.mitre.org/groups/G0070) is threat group that has been attributed to the Lebanese General Directorate of General Security (GDGS) and has operated since at least 2012.
TARGET SECTORS
MITRE ID: G0070
Nomadic Octopus
DustSquad
Unknown
6 techniques
[Nomadic Octopus](https://attack.mitre.org/groups/G0133) is a Russian-speaking cyber espionage threat group that has primarily targeted Central Asia, including local governments, diplomatic missions, and individuals, since at least 2014. [Nomadic Octopus](https://attack.mitre.org/groups/G0133) has been observed conducting campaigns involving Android and Windows malware, mainly using the Delphi pro
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0133
APT12
IXESHE
DynCalc
Numbered Panda
+1 more
China
5 techniques
[APT12](https://attack.mitre.org/groups/G0005) is a threat group that has been attributed to China. The group has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0005
APT3
Gothic Panda
Pirpi
UPS Team
+3 more
China
40 techniques
[APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security. This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap. As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organiza
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
T1003
Credential Dumping
T1005
T1016
T1018
T1021
Remote Services
T1027
Obfuscation
T1033
T1036
T1041
T1049
T1053
Scheduled Task
T1056
Input Capture
T1057
T1059
Scripting
T1069
T1070
T1074
T1078
Valid Accounts
T1082
System Info
T1083
File Discovery
T1087
T1090
Proxy
T1095
T1098
Account Manipulation
T1104
T1105
Tool Transfer
T1110
Brute Force
T1136
T1203
Exploitation
T1204
User Execution
T1218
T1543
T1546
T1547
Boot Autostart
T1552
T1555
T1560
T1564
T1566
Phishing
T1574
MITRE ID: G0022
Putter Panda
APT2
MSUpdater
Unknown
4 techniques
[Putter Panda](https://attack.mitre.org/groups/G0024) is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA’s 3rd General Staff Department (GSD).
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0024
Metador
Unknown
8 techniques
[Metador](https://attack.mitre.org/groups/G1013) is a suspected cyber espionage group that was first reported in September 2022. [Metador](https://attack.mitre.org/groups/G1013) has targeted a limited number of telecommunication companies, internet service providers, and universities in the Middle East and Africa. Security researchers named the group [Metador](https://attack.mitre.org/groups/G1013
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1013
TA459
Unknown
4 techniques
[TA459](https://attack.mitre.org/groups/G0062) is a threat group believed to operate out of China that has targeted countries including Russia, Belarus, Mongolia, and others.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0062
ZIRCONIUM
APT31
Violet Typhoon
China
25 techniques
[ZIRCONIUM](https://attack.mitre.org/groups/G0128) is a threat group operating out of China, active since at least 2017, that has targeted individuals associated with the 2020 US presidential election and prominent leaders in the international affairs community.
TARGET SECTORS
MITRE ID: G0128
APT1
Comment Crew
Comment Group
Comment Panda
China
20 techniques
[APT1](https://attack.mitre.org/groups/G0006) is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0006
Naikon
Unknown
13 techniques
[Naikon](https://attack.mitre.org/groups/G0019) is assessed to be a state-sponsored cyber espionage group attributed to the Chinese People’s Liberation Army’s (PLA) Chengdu Military Region Second Technical Reconnaissance Bureau (Military Unit Cover Designator 78020). Active since at least 2010, [Naikon](https://attack.mitre.org/groups/G0019) has primarily conducted operations against government, m
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0019
Sowbug
Unknown
9 techniques
[Sowbug](https://attack.mitre.org/groups/G0054) is a threat group that has conducted targeted attacks against organizations in South America and Southeast Asia, particularly government entities, since at least 2015.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0054
Mofang
Unknown
3 techniques
[Mofang](https://attack.mitre.org/groups/G0103) is a likely China-based cyber espionage group, named for its frequent practice of imitating a victim's infrastructure. This adversary has been observed since at least May 2012 conducting focused attacks against government and critical infrastructure in Myanmar, as well as several other countries and sectors including military, automobile, and weapons
MITRE ID: G0103
Machete
APT-C-43
El Machete
Unknown
7 techniques
[Machete](https://attack.mitre.org/groups/G0095) is a suspected Spanish-speaking cyber espionage group that has been active since at least 2010. It has primarily focused its operations within Latin America, with a particular emphasis on Venezuela, but also in the US, Europe, Russia, and parts of Asia. [Machete](https://attack.mitre.org/groups/G0095) generally targets high-profile organizations suc
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0095
FIN5
Unknown
10 techniques
[FIN5](https://attack.mitre.org/groups/G0053) is a financially motivated threat group that has targeted personally identifiable information and payment card information. The group has been active since at least 2008 and has targeted the restaurant, gaming, and hotel industries. The group is made up of actors who likely speak Russian.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0053
Winter Vivern
TA473
UAC-0114
Unknown
22 techniques
Winter Vivern is a group linked to Russian and Belorussian interests active since at least 2020 targeting various European government and NGO entities, along with sporadic targeting of Indian and US victims. The group leverages a combination of document-based phishing activity and server-side exploitation for initial access, leveraging adversary-controlled and -created infrastructure for follow-on
TARGET SECTORS
MITRE ID: G1035
SideCopy
Unknown
15 techniques
[SideCopy](https://attack.mitre.org/groups/G1008) is a Pakistani threat group that has primarily targeted South Asian countries, including Indian and Afghani government personnel, since at least 2019. [SideCopy](https://attack.mitre.org/groups/G1008)'s name comes from its infection chain that tries to mimic that of [Sidewinder](https://attack.mitre.org/groups/G0121), a suspected Indian threat grou
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1008
APT33
HOLMIUM
Elfin
Peach Sandstorm
China
23 techniques
[APT33](https://attack.mitre.org/groups/G0064) is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0064
Lotus Blossom
DRAGONFISH
Spring Dragon
RADIUM
+3 more
Unknown
17 techniques
[Lotus Blossom](https://attack.mitre.org/groups/G0030) is a long-standing threat group largely targeting various entities in Asia since at least 2009. In addition to government and related targets, [Lotus Blossom](https://attack.mitre.org/groups/G0030) has also targeted entities such as digital certificate issuers.
TARGET SECTORS
MITRE ID: G0030
GOLD SOUTHFIELD
Pinchy Spider
Unknown
9 techniques
[GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) is a financially motivated threat group active since at least 2018 that operates the [REvil](https://attack.mitre.org/software/S0496) Ransomware-as-a Service (RaaS). [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) provides backend infrastructure for affiliates recruited on underground forums to perpetrate high value deployments. By
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0115
Volatile Cedar
Lebanese Cedar
Unknown
4 techniques
[Volatile Cedar](https://attack.mitre.org/groups/G0123) is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. [Volatile Cedar](https://attack.mitre.org/groups/G0123) has been operating since 2012 and is motivated by political and ideological interests.
MITRE ID: G0123
Evilnum
Unknown
11 techniques
[Evilnum](https://attack.mitre.org/groups/G0120) is a financially motivated threat group that has been active since at least 2018.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0120
Cleaver
Threat Group 2889
TG-2889
Unknown
5 techniques
[Cleaver](https://attack.mitre.org/groups/G0003) is a threat group that has been attributed to Iranian actors and is responsible for activity tracked as Operation Cleaver. Strong circumstantial evidence suggests Cleaver is linked to Threat Group 2889 (TG-2889).
MITRE ID: G0003
TEMP.Veles
XENOTIME
Unknown
0 techniques
[TEMP.Veles](https://attack.mitre.org/groups/G0088) is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing [TRITON](https://attack.mitre.org/software/S0609), a malware framework designed to manipulate industrial safety systems.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0088
DarkHydrus
Unknown
7 techniques
[DarkHydrus](https://attack.mitre.org/groups/G0079) is a threat group that has targeted government agencies and educational institutions in the Middle East since at least 2016. The group heavily leverages open-source tools and custom payloads for carrying out attacks.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0079
Whitefly
Unknown
9 techniques
[Whitefly](https://attack.mitre.org/groups/G0107) is a cyber espionage group that has been operating since at least 2017. The group has targeted organizations based mostly in Singapore across a wide variety of sectors, and is primarily interested in stealing large amounts of sensitive information. The group has been linked to an attack against Singapore’s largest public health organization, SingHe
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0107
Silent Librarian
TA407
COBALT DICKENS
Unknown
10 techniques
[Silent Librarian](https://attack.mitre.org/groups/G0122) is a group that has targeted research and proprietary data at universities, government agencies, and private sector companies worldwide since at least 2013. Members of [Silent Librarian](https://attack.mitre.org/groups/G0122) are known to have been affiliated with the Iran-based Mabna Institute which has conducted cyber intrusions at the b
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0122
APT18
TG-0416
Dynamite Panda
Threat Group-0416
China
11 techniques
[APT18](https://attack.mitre.org/groups/G0026) is a threat group that has operated since at least 2009 and has targeted a range of industries, including technology, manufacturing, human rights groups, government, and medical.
TARGET SECTORS
MITRE ID: G0026
Carbanak
Anunak
Russia
8 techniques
[Carbanak](https://attack.mitre.org/groups/G0008) is a cybercriminal group that has used [Carbanak](https://attack.mitre.org/software/S0030) malware to target financial institutions since at least 2013. [Carbanak](https://attack.mitre.org/groups/G0008) may be linked to groups tracked separately as [Cobalt Group](https://attack.mitre.org/groups/G0080) and [FIN7](https://attack.mitre.org/groups/G004
TARGET SECTORS
MITRE ID: G0008
Orangeworm
Unknown
2 techniques
[Orangeworm](https://attack.mitre.org/groups/G0071) is a group that has targeted organizations in the healthcare sector in the United States, Europe, and Asia since at least 2015, likely for the purpose of corporate espionage. Reverse engineering of [Kwampirs](https://attack.mitre.org/software/S0236), directly associated with [Orangeworm](https://attack.mitre.org/groups/G0071) activity, indicates
MITRE ID: G0071
Deep Panda
Shell Crew
WebMasters
KungFu Kittens
+2 more
Unknown
10 techniques
[Deep Panda](https://attack.mitre.org/groups/G0009) is a suspected Chinese threat group known to target many industries, including government, defense, financial, and telecommunications. The intrusion into healthcare company Anthem has been attributed to [Deep Panda](https://attack.mitre.org/groups/G0009). This group is also known as Shell Crew, WebMasters, KungFu Kittens, and PinkPanther. [Dee
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0009
APT-C-36
Blind Eagle
Unknown
9 techniques
[APT-C-36](https://attack.mitre.org/groups/G0099) is a suspected South America espionage group that has been active since at least 2018. The group mainly targets Colombian government institutions as well as important corporations in the financial sector, petroleum industry, and professional manufacturing.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0099
The White Company
Unknown
7 techniques
[The White Company](https://attack.mitre.org/groups/G0089) is a likely state-sponsored threat actor with advanced capabilities. From 2017 through 2018, the group led an espionage campaign called Operation Shaheen targeting government and military organizations in Pakistan.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0089
Poseidon Group
Unknown
7 techniques
[Poseidon Group](https://attack.mitre.org/groups/G0033) is a Portuguese-speaking threat group that has been active since at least 2005. The group has a history of using information exfiltrated from victims to blackmail victim companies into contracting the [Poseidon Group](https://attack.mitre.org/groups/G0033) as a security firm.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0033
LazyScripter
Unknown
13 techniques
[LazyScripter](https://attack.mitre.org/groups/G0140) is threat group that has mainly targeted the airlines industry since at least 2018, primarily using open-source toolsets.
TARGET SECTORS
MITRE ID: G0140
Gallmaker
Unknown
6 techniques
[Gallmaker](https://attack.mitre.org/groups/G0084) is a cyberespionage group that has targeted victims in the Middle East and has been active since at least December 2017. The group has mainly targeted victims in the defense, military, and government sectors.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0084
MoustachedBouncer
Unknown
7 techniques
[MoustachedBouncer](https://attack.mitre.org/groups/G1019) is a cyberespionage group that has been active since at least 2014 targeting foreign embassies in Belarus.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1019
CopyKittens
Unknown
7 techniques
[CopyKittens](https://attack.mitre.org/groups/G0052) is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip.
MITRE ID: G0052
Star Blizzard
SEABORGIUM
Callisto Group
TA446
+1 more
Unknown
15 techniques
[Star Blizzard](https://attack.mitre.org/groups/G1033) is a cyber espionage and influence group originating in Russia that has been active since at least 2019. [Star Blizzard](https://attack.mitre.org/groups/G1033) campaigns align closely with Russian state interests and have included persistent phishing and credential theft against academic, defense, government, NGO, and think tank organizations
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1033
Thrip
Unknown
4 techniques
[Thrip](https://attack.mitre.org/groups/G0076) is an espionage group that has targeted satellite communications, telecoms, and defense contractor companies in the U.S. and Southeast Asia. The group uses custom malware as well as "living off the land" techniques.
MITRE ID: G0076
PROMETHIUM
StrongPity
Unknown
9 techniques
[PROMETHIUM](https://attack.mitre.org/groups/G0056) is an activity group focused on espionage that has been active since at least 2012. The group has conducted operations globally with a heavy emphasis on Turkish targets. [PROMETHIUM](https://attack.mitre.org/groups/G0056) has demonstrated similarity to another activity group called [NEODYMIUM](https://attack.mitre.org/groups/G0055) due to overlap
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0056
GCMAN
Unknown
1 techniques
[GCMAN](https://attack.mitre.org/groups/G0036) is a threat group that focuses on targeting banks for the purpose of transferring money to e-currency services.
MITRE ID: G0036
Ferocious Kitten
Unknown
5 techniques
[Ferocious Kitten](https://attack.mitre.org/groups/G0137) is a threat group that has primarily targeted Persian-speaking individuals in Iran since at least 2015.
MITRE ID: G0137
PittyTiger
Unknown
2 techniques
[PittyTiger](https://attack.mitre.org/groups/G0011) is a threat group believed to operate out of China that uses multiple different types of malware to maintain command and control.
MITRE ID: G0011
APT17
Deputy Dog
China
2 techniques
[APT17](https://attack.mitre.org/groups/G0025) is a China-based threat group that has conducted network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations.
MITRE ID: G0025
Water Galura
GOLD FEATHER
Unknown
3 techniques
[Water Galura](https://attack.mitre.org/groups/G1050) are the operators of the [Qilin](https://attack.mitre.org/software/S1242) Ransomware-as-a-Service (RaaS) who handle payload generation, ransom negotiations, and the publication of stolen data for [Qilin](https://attack.mitre.org/software/S1242) affilates recruited on Russian cybercrime forums. [Water Galura](https://attack.mitre.org/groups/G105
MITRE ID: G1050
BlackOasis
Unknown
1 techniques
[BlackOasis](https://attack.mitre.org/groups/G0063) is a Middle Eastern threat group that is believed to be a customer of Gamma Group. The group has shown interest in prominent figures in the United Nations, as well as opposition bloggers, activists, regional news correspondents, and think tanks. A group known by Microsoft as [NEODYMIUM](https://attack.mitre.org/groups/G0055) is reportedly assoc
MITRE ID: G0063
IndigoZebra
Unknown
6 techniques
[IndigoZebra](https://attack.mitre.org/groups/G0136) is a suspected Chinese cyber espionage group that has been targeting Central Asian governments since at least 2014.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0136
SilverTerrier
Unknown
2 techniques
[SilverTerrier](https://attack.mitre.org/groups/G0083) is a Nigerian threat group that has been seen active since 2014. [SilverTerrier](https://attack.mitre.org/groups/G0083) mainly targets organizations in high technology, higher education, and manufacturing.
MITRE ID: G0083
Strider
ProjectSauron
Unknown
3 techniques
[Strider](https://attack.mitre.org/groups/G0041) is a threat group that has been active since at least 2011 and has targeted victims in Russia, China, Sweden, Belgium, Iran, and Rwanda.
MITRE ID: G0041
AppleJeus
Gleaming Pisces
Citrine Sleet
UNC1720
+1 more
Unknown
2 techniques
[AppleJeus](https://attack.mitre.org/groups/G1049) is a North Korean state-sponsored threat group attributed to the Reconnaissance General Bureau. Associated with the broader [Lazarus Group](https://attack.mitre.org/groups/G0032) umbrella of actors, [AppleJeus](https://attack.mitre.org/groups/G1049) has been active since at least 2018 and is closely aligned in resources with TEMP.hermit, another D
MITRE ID: G1049
Scarlet Mimic
Unknown
1 techniques
[Scarlet Mimic](https://attack.mitre.org/groups/G0029) is a threat group that has targeted minority rights activists. This group has not been directly linked to a government source, but the group's motivations appear to overlap with those of the Chinese government. While there is some overlap between IP addresses used by [Scarlet Mimic](https://attack.mitre.org/groups/G0029) and [Putter Panda](htt
MITRE ID: G0029
TA578
Unknown
4 techniques
[TA578](https://attack.mitre.org/groups/G1038) is a threat actor that has used contact forms and email to initiate communications with victims and to distribute malware including [Latrodectus](https://attack.mitre.org/software/S1160), [IcedID](https://attack.mitre.org/software/S0483), and [Bumblebee](https://attack.mitre.org/software/S1039).
MITRE ID: G1038
APT16
China
1 techniques
[APT16](https://attack.mitre.org/groups/G0023) is a China-based threat group that has launched spearphishing campaigns targeting Japanese and Taiwanese organizations.
MITRE ID: G0023
Moafee
Unknown
1 techniques
[Moafee](https://attack.mitre.org/groups/G0002) is a threat group that appears to operate from the Guandong Province of China. Due to overlapping TTPs, including similar custom tools, Moafee is thought to have a direct or indirect relationship with the threat group [DragonOK](https://attack.mitre.org/groups/G0017).
MITRE ID: G0002
NEODYMIUM
Unknown
0 techniques
[NEODYMIUM](https://attack.mitre.org/groups/G0055) is an activity group that conducted a campaign in May 2016 and has heavily targeted Turkish victims. The group has demonstrated similarity to another activity group called [PROMETHIUM](https://attack.mitre.org/groups/G0056) due to overlapping victim and campaign characteristics. [NEODYMIUM](https://attack.mitre.org/groups/G0055) is reportedly as
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0055
DragonOK
Unknown
0 techniques
[DragonOK](https://attack.mitre.org/groups/G0017) is a threat group that has targeted Japanese organizations with phishing emails. Due to overlapping TTPs, including similar custom tools, [DragonOK](https://attack.mitre.org/groups/G0017) is thought to have a direct or indirect relationship with the threat group [Moafee](https://attack.mitre.org/groups/G0002). It is known to use a variety of malwa
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G0017
APT-C-23
Mantis
Arid Viper
Desert Falcon
+4 more
Unknown
0 techniques
[APT-C-23](https://attack.mitre.org/groups/G1028) is a threat group that has been active since at least 2014. [APT-C-23](https://attack.mitre.org/groups/G1028) has primarily focused its operations on the Middle East, including Israeli military assets. [APT-C-23](https://attack.mitre.org/groups/G1028) has developed mobile spyware targeting Android and iOS devices since 2017.
TARGET SECTORS
MITRE ATT&CK TECHNIQUES
MITRE ID: G1028
Technique Quick Reference
Click a technique above to highlight actors that use it
| ID | NAME | TACTIC | USED BY | |
|---|---|---|---|---|
| T1566 | Phishing | Initial Access |
LuminousMoth
Wizard Spider
Elderwood
FIN7
WIRTE
Dragonfly
OilRig
Lazarus Group
TA505
Inception
admin@338
BlackTech
APT42
Malteiro
Earth Lusca
Sandworm Team
TA577
Turla
FIN6
Silence
Patchwork
APT28
Darkhotel
Magic Hound
APT29
EXOTIC LILY
Cobalt Group
Andariel
APT39
MuddyWater
APT38
Transparent Tribe
APT32
BRONZE BUTLER
Kimsuky
Leviathan
Storm-1811
Ajax Security Team
Mustang Panda
TA2541
ToddyCat
BITTER
RTM
menuPass
Tropic Trooper
Mustard Tempest
APT19
Molerats
APT37
APT41
INC Ransom
PLATINUM
FIN8
Saint Bear
CURIUM
RedCurl
FIN4
Contagious Interview
Gorgon Group
Sidewinder
Higaisa
APT30
Windshift
Confucius
Threat Group-3390
Tonto Team
Gamaredon Group
Sea Turtle
Rancor
Moonstone Sleet
TA551
Axiom
Dark Caracal
Nomadic Octopus
APT12
APT3
TA459
ZIRCONIUM
APT1
Naikon
Mofang
Machete
Winter Vivern
SideCopy
APT33
GOLD SOUTHFIELD
Evilnum
DarkHydrus
APT-C-36
The White Company
LazyScripter
Gallmaker
Star Blizzard
Ferocious Kitten
IndigoZebra
AppleJeus
|
↗ |
| T1078 | Valid Accounts | Initial Access / Persistence |
Indrik Spider
Medusa Group
Wizard Spider
FIN7
UNC3886
Velvet Ant
Dragonfly
OilRig
Fox Kitten
Lazarus Group
Aquatic Panda
TA505
Play
Sandworm Team
Turla
Suckfly
Ember Bear
FIN6
Silence
APT28
Cinnamon Tempest
Ke3chang
Volt Typhoon
Magic Hound
APT29
HAFNIUM
APT39
APT32
POLONIUM
APT5
Kimsuky
Leviathan
Akira
LAPSUS$
Chimera
ToddyCat
menuPass
Storm-0501
Tropic Trooper
Threat Group-1314
APT41
INC Ransom
FIN13
GALLIUM
FIN10
FIN8
Scattered Spider
FIN4
BlackByte
Threat Group-3390
Agrius
Sea Turtle
Axiom
APT3
Naikon
FIN5
APT33
Silent Librarian
APT18
Carbanak
Star Blizzard
PROMETHIUM
PittyTiger
|
↗ |
| T1190 | Exploit Public-Facing App | Initial Access |
Medusa Group
FIN7
UNC3886
Dragonfly
Fox Kitten
BlackTech
Earth Lusca
Play
Sandworm Team
Ember Bear
APT28
Cinnamon Tempest
Ke3chang
Volt Typhoon
Magic Hound
APT29
HAFNIUM
APT39
MuddyWater
APT5
BackdoorDiplomacy
Kimsuky
Leviathan
ToddyCat
menuPass
Storm-0501
Moses Staff
APT41
INC Ransom
FIN13
GALLIUM
Rocke
Blue Mockingbird
BlackByte
Threat Group-3390
Agrius
Sea Turtle
Salt Typhoon
Axiom
Winter Vivern
GOLD SOUTHFIELD
Volatile Cedar
|
↗ |
| T1195 | Supply Chain Compromise | Initial Access |
FIN7
Dragonfly
OilRig
Daggerfly
Sandworm Team
Ember Bear
Cobalt Group
APT41
Threat Group-3390
Moonstone Sleet
GOLD SOUTHFIELD
|
↗ |
| T1059 | Command & Scripting Interp. | Execution |
Indrik Spider
Medusa Group
Wizard Spider
FIN7
UNC3886
Velvet Ant
WIRTE
Dragonfly
OilRig
Fox Kitten
Lazarus Group
Aquatic Panda
Daggerfly
TeamTNT
TA505
Inception
admin@338
APT42
Malteiro
Earth Lusca
Play
Sandworm Team
TA577
Turla
Suckfly
Ember Bear
FIN6
Silence
Patchwork
APT28
Cinnamon Tempest
HEXANE
Darkhotel
Ke3chang
Volt Typhoon
Leafminer
Magic Hound
APT29
Cobalt Group
HAFNIUM
APT39
MuddyWater
APT38
Transparent Tribe
APT32
BRONZE BUTLER
APT5
Kimsuky
Leviathan
Storm-1811
Akira
Mustang Panda
Chimera
TA2541
ToddyCat
menuPass
Storm-0501
Tropic Trooper
APT19
Molerats
Stealth Falcon
DarkVishnya
APT37
Threat Group-1314
APT41
INC Ransom
FIN13
GALLIUM
FIN10
FIN8
Rocke
Saint Bear
Scattered Spider
CURIUM
Windigo
Blue Mockingbird
RedCurl
FIN4
Contagious Interview
Gorgon Group
Sidewinder
Higaisa
Windshift
Confucius
BlackByte
Threat Group-3390
Tonto Team
Gamaredon Group
Agrius
Sea Turtle
Rancor
TA551
Dark Caracal
Nomadic Octopus
APT3
Metador
TA459
ZIRCONIUM
APT1
Sowbug
Machete
FIN5
Winter Vivern
SideCopy
APT33
GOLD SOUTHFIELD
Evilnum
DarkHydrus
Whitefly
APT18
Deep Panda
APT-C-36
Poseidon Group
LazyScripter
Gallmaker
MoustachedBouncer
CopyKittens
Star Blizzard
Thrip
TA578
|
↗ |
| T1203 | Exploitation for Exec. | Execution |
Elderwood
UNC3886
Dragonfly
OilRig
Lazarus Group
Inception
admin@338
BlackTech
Sandworm Team
Ember Bear
Patchwork
APT28
Aoqin Dragon
Darkhotel
APT29
EXOTIC LILY
Cobalt Group
Andariel
MuddyWater
Transparent Tribe
APT32
BRONZE BUTLER
Leviathan
Mustang Panda
BITTER
Tropic Trooper
APT37
APT41
Saint Bear
Sidewinder
Higaisa
Confucius
Threat Group-3390
Tonto Team
Sea Turtle
Axiom
APT12
APT3
TA459
APT33
The White Company
|
↗ |
| T1204 | User Execution | Execution |
Indrik Spider
LuminousMoth
Wizard Spider
Elderwood
FIN7
WIRTE
Dragonfly
OilRig
Lazarus Group
Daggerfly
TeamTNT
TA505
Inception
admin@338
BlackTech
Malteiro
Earth Lusca
Sandworm Team
TA577
Turla
FIN6
Silence
Patchwork
APT28
Aoqin Dragon
HEXANE
Darkhotel
Magic Hound
APT29
EXOTIC LILY
Cobalt Group
Andariel
APT39
MuddyWater
APT38
Transparent Tribe
APT32
BRONZE BUTLER
Kimsuky
Leviathan
Storm-1811
Ajax Security Team
Mustang Panda
LAPSUS$
TA2541
BITTER
RTM
menuPass
Tropic Trooper
Mustard Tempest
APT19
Molerats
APT37
PLATINUM
FIN8
Saint Bear
Scattered Spider
CURIUM
RedCurl
FIN4
Contagious Interview
Gorgon Group
Sidewinder
Higaisa
APT30
Windshift
Confucius
Threat Group-3390
Tonto Team
Gamaredon Group
Rancor
Moonstone Sleet
TA551
Dark Caracal
Nomadic Octopus
APT12
APT3
TA459
ZIRCONIUM
Naikon
Mofang
Machete
Winter Vivern
SideCopy
APT33
Evilnum
DarkHydrus
Whitefly
APT-C-36
The White Company
LazyScripter
Gallmaker
Star Blizzard
PROMETHIUM
Ferocious Kitten
IndigoZebra
TA578
|
↗ |
| T1071 | App Layer Protocol | Command & Control |
LuminousMoth
Medusa Group
Wizard Spider
FIN7
Velvet Ant
WIRTE
Dragonfly
OilRig
Lazarus Group
Daggerfly
TeamTNT
TA505
Inception
APT42
Sandworm Team
Turla
Ember Bear
APT28
Ke3chang
Magic Hound
Cobalt Group
HAFNIUM
APT39
MuddyWater
APT38
APT32
BRONZE BUTLER
Kimsuky
Mustang Panda
Chimera
BITTER
Tropic Trooper
APT19
Stealth Falcon
APT37
APT41
INC Ransom
FIN13
FIN8
Rocke
RedEcho
RedCurl
FIN4
Contagious Interview
Sidewinder
Higaisa
Windshift
Confucius
BlackByte
Threat Group-3390
Gamaredon Group
Sea Turtle
Rancor
Moonstone Sleet
TA551
Dark Caracal
Metador
Winter Vivern
APT33
APT18
Orangeworm
LazyScripter
SilverTerrier
|
↗ |
| T1090 | Proxy | Command & Control |
Medusa Group
Velvet Ant
Fox Kitten
Lazarus Group
Inception
Earth Lusca
Sandworm Team
Turla
Ember Bear
Silence
APT28
Cinnamon Tempest
Volt Typhoon
Magic Hound
APT29
APT39
MuddyWater
POLONIUM
Leviathan
LAPSUS$
menuPass
APT41
FIN13
GALLIUM
Scattered Spider
Windigo
Blue Mockingbird
FIN4
Contagious Interview
Higaisa
Tonto Team
Gamaredon Group
APT3
ZIRCONIUM
FIN5
Lotus Blossom
MoustachedBouncer
CopyKittens
Strider
|
↗ |
| T1105 | Ingress Tool Transfer | Command & Control |
Indrik Spider
LuminousMoth
Medusa Group
Wizard Spider
Elderwood
FIN7
WIRTE
Dragonfly
OilRig
Fox Kitten
Lazarus Group
Aquatic Panda
Daggerfly
TeamTNT
TA505
Play
Sandworm Team
Turla
Silence
Patchwork
APT28
Cinnamon Tempest
HEXANE
Darkhotel
Ke3chang
Volt Typhoon
Magic Hound
APT29
Cobalt Group
Andariel
HAFNIUM
APT39
MuddyWater
APT38
APT32
BRONZE BUTLER
BackdoorDiplomacy
Kimsuky
Leviathan
Storm-1811
Ajax Security Team
Mustang Panda
Chimera
TA2541
BITTER
menuPass
Tropic Trooper
Mustard Tempest
Moses Staff
Molerats
APT37
APT41
INC Ransom
FIN13
PLATINUM
GALLIUM
Winnti Group
FIN8
Rocke
Scattered Spider
Gorgon Group
Sidewinder
Windshift
Confucius
BlackByte
Threat Group-3390
Tonto Team
Gamaredon Group
Rancor
Moonstone Sleet
TA551
Nomadic Octopus
APT3
Metador
ZIRCONIUM
Winter Vivern
SideCopy
APT33
Volatile Cedar
Evilnum
Whitefly
APT18
APT-C-36
LazyScripter
IndigoZebra
|
↗ |
| T1056 | Input Capture | Credential Access |
OilRig
Lazarus Group
APT42
Sandworm Team
APT28
HEXANE
Darkhotel
Ke3chang
Volt Typhoon
Magic Hound
APT39
APT38
APT32
APT5
Kimsuky
Storm-1811
Ajax Security Team
menuPass
APT41
FIN13
Group5
PLATINUM
RedCurl
FIN4
Threat Group-3390
Tonto Team
APT3
Sowbug
Winter Vivern
|
↗ |
| T1110 | Brute Force | Credential Access |
Dragonfly
OilRig
Fox Kitten
Lazarus Group
Turla
Ember Bear
FIN6
APT28
HEXANE
Leafminer
APT29
HAFNIUM
APT39
APT38
Chimera
Storm-0501
DarkVishnya
APT41
Agrius
Salt Typhoon
APT3
FIN5
APT33
Silent Librarian
|
↗ |
| T1486 | Data Encrypted for Impact | Impact |
Indrik Spider
Medusa Group
FIN7
TA505
Sandworm Team
Magic Hound
APT38
Storm-1811
Akira
Storm-0501
APT41
INC Ransom
FIN8
Scattered Spider
BlackByte
Moonstone Sleet
Water Galura
|
↗ |
| T1027 | Obfuscated Files/Info | Defense Evasion |
Medusa Group
Wizard Spider
Elderwood
FIN7
UNC3886
OilRig
Fox Kitten
Lazarus Group
Aquatic Panda
TeamTNT
TA505
Inception
Malteiro
Earth Lusca
Play
Sandworm Team
TA577
Turla
FIN6
Silence
Patchwork
APT28
Aoqin Dragon
HEXANE
Darkhotel
Ke3chang
Volt Typhoon
Leafminer
Magic Hound
APT29
Cobalt Group
Andariel
APT39
MuddyWater
APT38
Transparent Tribe
APT32
BRONZE BUTLER
BackdoorDiplomacy
Kimsuky
Leviathan
Storm-1811
Akira
Mustang Panda
Chimera
TA2541
BITTER
menuPass
Storm-0501
Tropic Trooper
APT19
Moses Staff
Molerats
APT37
APT41
Group5
GALLIUM
FIN8
Rocke
Saint Bear
Blue Mockingbird
RedCurl
Contagious Interview
Sidewinder
Higaisa
Windshift
Threat Group-3390
Gamaredon Group
Sea Turtle
Moonstone Sleet
TA551
Dark Caracal
APT3
Putter Panda
Metador
ZIRCONIUM
Mofang
APT33
GOLD SOUTHFIELD
Whitefly
APT18
Deep Panda
APT-C-36
The White Company
LazyScripter
Gallmaker
MoustachedBouncer
BlackOasis
Moafee
|
↗ |