Group 2024  Group  2025  2024

DATE NAME INFO    
17.12.24 TA397 Proofpoint observed advanced persistent threat (APT) TA397 targeting a Turkish defense sector organization with a lure about public infrastructure projects in Madagascar.   GROUP GROUP
14.12.24 MUT-1244 Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials GROUP GROUP
12.12.24 Gamaredon  Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our research shows that the Gamaredon Group has been active since at least 2013. GROUP APT
11.12.24 Secret Blizzard Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine GROUP GROUP

26.11.24

RomCom

RomCom exploits Firefox and Windows zero days in the wild

GROUP

GROUP

26.11.24

Game of Emperor

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions

GROUP

GROUP

23.11.24

Sapphire Slee

Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON

GROUP

GROUP

22.11.24

TAG-110

Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY

GROUP

GROUP

22.11.24

TAG-112

China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike

GROUP

GROUP

21.11.24

Gelsemium 

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

GROUP

GROUP

19.11.24

LIMINAL PANDA

Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector

GROUP

GROUP

16.11.24

BrazenBamboo 

BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA

GROUP

GROUP

13.11.24

WIRTE

Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity

GROUP

GROUP

28.10.24

UNC5812 Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives GROUPGROUP

28.10.24

Crypt Ghouls Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia GROUPGROUP

27.10.24

Water Makara Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware GROUPGROUP

27.10.24

UAT-5647 UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants GROUP APT

27.9.24

Embargo Embargo Ransomware Group Strikes DME Delivers in Cyber Attack GROUP RANSOMWARE

27.9.24

DragonForceInside the Dragon: DragonForce Ransomware Group GROUPRANSOMWARE

26.9.24

BlackJackBlackJack is a hacktivist group that emerged at the end of 2023, targeting companies based in Russia. In their Telegram channel, the group states that it aims to find vulnerabilities in the networks of Russian organizations and government institutions. GROUPHacktivist

22.9.24

Marko Polo“Marko Polo” Navigates Uncharted Waters With Infostealer Empire GROUPGROUP

21.9.24

TWELVE-=TWELVE=- is back GROUPGROUP

13.9.24

DragonRankDragonRank, a Chinese-speaking SEO manipulator service provider GROUPGROUP

11.9.24

CosmicBeetle CosmicBeetle steps up: Probation period at RansomHub GROUP RANSOMWARE

9.9.24

Unit 29155Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure GROUPMilitary group

5.9.24

Head MareHead Mare: adventures of a unicorn in Russia and Belarus GROUPGROUP

21.8.24

UTG-Q-010UTG-Q-010: Targeted Attack Campaign Against the AI and Gaming Industry GROUP GROUP

21.8.24

TA453Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset GROUP GROUP

15.8.24

Actor240524New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel GROUPAPT

6.8.24

Moonstone SleetStressed Pungsan: DPRK-aligned threat actor leverages npm for initial access GROUPGROUP

2.8.24

Cuckoo Spear

Cuckoo Spear – the latest Nation-state Threat Actor targeting Japanese companies

GROUP

GROUP

27.7.24

Handala Hacking TeamHandala Hack: What We Know About the Rising Threat Actor GROUPGROUP

27.7.24

Cuckoo SpearHighly sophisticated, well-funded, and strategically motivated nation-state cybersecurity threats are complex and challenging, requiring advanced cybersecurity measures, threat intelligence, and international cooperation. GROUPGROUP

26.7.24

APT45APT45: North Korea’s Digital Military Machine GROUPAPT

25.7.24

PatchworkThe Patchwork group has updated its arsenal, launching attacks for the first time using Brute Ratel C4 and an enhanced version of PGoShell GROUPGROUP

24.7.24

Daggerfly

Daggerfly: Espionage Group Makes Major Update to Toolset

GROUP

Espionage

23.7.24

VIGORISH VIPERGAMBLING IS NO GAME: DNS LINKS BETWEEN CHINESE ORGANIZED CRIME AND SPORTS SPONSORSHIPS GROUPGROUP

23.7.24

FLUXROOT A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. GROUPHACKING

23.7.24

Prolific PumaPlay Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma GROUPRansomware

19.7.24

UNC5537UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion GROUPGROUP

18.7.24

TAG-100TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies GROUPGROUP

16.7.24

MuddyWaterMuddyWater replaces Atera by custom MuddyRot implant in a recent campaign GROUPGROUP

16.7.24

Void BansheeCVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks GROUPGROUP

14.7.24

CRYSTALRAYCRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools GROUPGROUP

30.6.24

Unfurling HemlockUnfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware GROUPGROUP

30.6.24

KADOKAWAService Outages on Multiple Websites of the KADOKAWA Gro GROUPGROUP
27.6.24ChamelGangChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware GroupGang
26.6.24FIN9Inside the DEA Tool Hackers Allegedly Used to Extort Targets GROUPAPT
26.6.24ExCobaltExCobalt: GoRed, the hidden-tunnel technique GROUPCyber Gang
19.6.24UNC3886Cloaked and Covert: Uncovering UNC3886 Espionage Operations GROUP CAMPAIGN
14.6.24UNC4899Insights on Cyber Threats Targeting Users and Enterprises in Brazil GROUPGROUP
11.6.24UNC5537UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion GROUPGROUP
10.6.24Sticky WerewolfHowling at the Inbox: Sticky Werewolf's Latest Malicious Aviation Attacks GROUPGROUP

7.6.24

GhostWriter

Ghostwriter is referred as an 'activity set', with various incidents tied together by overlapping behavioral characteristics and personas, rather than as an actor or group in itself.

GROUP

GROUP

7.6.24

Commando Cat

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers

GROUP

Cryptojacking

3.6.24

Andariel

Analysis of APT Attack Cases Using Dora RAT Against Korean Companies (Andariel Group)

GROUP

APT

31.5.24

UAC-0006UAC-0006 is a financially motivated threat actor that has been active since at least 2013. They primarily target Ukrainian organizations, particularly accountants, with phishing emails containing the SmokeLoader malware. GroupGroup

31.5.24

FlyingYeti Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. GroupGroup

30.5.24

LilacSquidThe stealthy trilogy of PurpleInk, InkBox and InkLoader GroupGroup

29.5.24

Moonstone Sleet Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks GroupAPT

27.5.24

Storm-0539Navigating cyberthreats and strengthening defenses in the era of AI GroupGroup

25.5.24

Space Pirates

Space Pirates: analyzing the tools and connections of a new hacker group

Group

Group

25.5.24

ShadowSyndicate

No sleep until the Cybercrime Fighters Club is done with finding the answer as to who is behind this new ransomware-as-a-service affiliate.

Group

Group

24.5.24

SHARP DRAGON

SHARP DRAGON EXPANDS TOWARDS AFRICA AND THE CARIBBEAN

Group

APT 

23.5.24

Unfading Sea Haze

Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea

Group

Group

21.5.24

Void ManticoreBAD KARMA, NO JUSTICE: VOID MANTICORE DESTRUCTIVE ACTIVITIES IN ISRAEL GroupGroup

21.5.24

GitCaughtGitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure GroupGroup

18.5.24

KinsingKinsing Demystified A Comprehensive Technical Guide GroupHacking

16.5.24

Storm-1811Threat actors misusing Quick Assist in social engineering attacks leading to ransomware GroupGroup
19.4.24 FIN7 Threat Group FIN7 Targets the U.S. Automotive Industry GroupAPT
16.4.24 Muddled Libra Muddled Libra also uses the legitimate scalability and native functionality of CSP services to create new resources to assist with data exfiltration. All CSPs have terms of service (TOS) policies that explicitly prohibit activities like those performed by Muddled Libra. GroupGroup
12.4.24 TA547 Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer GroupGroup

11.4.24

Virtual Invaders

There is no indication that this campaign is linked to any known group; however, we are tracking the threat actors behind it under the moniker Virtual Invaders.

Group

Group

9.4.24 Starry Addax Starry Addax targets human rights defenders in North Africa with new malware GroupGroup
5.4.24 UTA0178 While Volexity largely observed the attacker essentially living off the land, they still deployed a handful of malware files and tools during the course of the incident which primarily consisted of webshells, proxy utilities, and file modifications to allow credential harvesting. GroupGroup
5.4.24 CoralRaider CoralRaider targets victims’ data and social media accounts GroupGroup
2.4.24 Earth Freybug This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON. Group Group
28.3.24 NARWHAL SPIDER NARWHAL SPIDER’s operation of Cutwail v2 was limited to country-specific spam campaigns, although late in 2019 there appeared to be an effort to expand by bringing in INDRIK SPIDER as a customer. Group APT
27.3.24 Earth Krahang Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks Group APT
27.3.24 Earth Lusca  Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections Group APT
27.3.24 BRONZE VINEWOOD DETAILS ON BRONZE VINEWOOD, IMPLICATED IN TARGETING OF THE U.S. ELECTION CAMPAIGN Group APT
26.3.24Lord Nemesis Strikes“Lord Nemesis Strikes: Supply Chain Attack on the Israeli Academic Sector GroupHacktivism
26.3.24TA450Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign GroupAPT
24.3.24SpringtailSpringtail APT group abuses valid certificate of known Korean public entity GroupAPT
24.3.24KimsukyThe Updated APT Playbook: Tales from the Kimsuky threat actor group GroupAPT
22.3.24UNC302BRONZE SPRING is a threat group that CTU researchers assess with high confidence operates on behalf of China in the theft of intellectual property from defense, engineering, pharmaceutical and technology companies GroupGroup
22.3.24UNC3886UNC3886 is an advanced cyber espionage group with unique capabilities in how they operate on-network as well as the tools they utilize in their campaigns. UNC3886 has been observed targeting firewall and virtualization technologies which lack EDR support. GroupGroup
22.3.24UNC5221While Volexity largely observed the attacker essentially living off the land, they still deployed a handful of malware files and tools during the course of the incident which primarily consisted of webshells, proxy utilities, and file modifications to allow credential harvesting. GroupGroup

20.3.24

Andariel

Andariel Group (MeshAgent) is attacking by abusing domestic asset management solutions

Group

Group

18.3.24

ITG05 

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

Group

Group

14.3.24APT-C-36Since April 2018, an APT group (Blind Eagle, APT-C-36) suspected coming from South America carried out continuous targeted attacks against Colombian government institutions as well as important corporations in financial sector, petroleum industry, professional manufacturing, etc. GroupAPT
14.3.24DarkCasinoDarkCasino is an economically motivated APT group that targets online trading platforms, including cryptocurrencies, online casinos, network banks, and online credit platforms. GroupAPT
11.3.24BianLianBianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. GroupRansomware
7.3.24Evasive PandaEvasive Panda is an APT group that has been active since at least 2012, conducting cyberespionage targeting individuals, government institutions and organizations. GroupAPT
7.3.24TA4903TA4903: Actor Spoofs U.S. Government, Small Businesses in Phishing, BEC Bids GroupPhishing
7.3.248220 Mining GroupReturned Libra, also known as 8220 Mining Group, is a cloud threat actor group that has been active since at least 2017. GroupCryptocurrency
6.3.24GhostSecGhostSec is a hacktivist group that emerged as an offshoot of Anonymous. Group Ransomware
6.3.24UNC1945UNC1945 is an APT group that has been targeting telecommunications companies globally. GroupAPT
6.3.24APT32Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intrusions into private sector companies across multiple industries and have also targeted foreign governments, dissidents, and journalists. GroupAPT
6.3.24 KimsukyJOINT CYBERSECURITY ADVISORY North Korean Advanced Persistent Threat Focus: Kimsuky GroupAPT
5.3.24TA577TA577’s Unusual Attack Chain Leads to NTLM Data Theft GroupGroup
2.3.24Scattered SpiderScattered Spider, a highly active hacking group, has made headlines by targeting more than 130 organizations, with the number of victims steadily increasing. GroupHacking
2.3.24BlackTechBlackTech is a cyber espionage group operating against targets in East Asia, particularly Taiwan, and occasionally, Japan and Hong Kong. Based on the mutexes and domain names of some of their C&C servers, BlackTech’s campaigns are likely designed to steal their target’s technology. GroupCyberSpy
2.3.24Peach Sandstorm Our analysis reveals that APT33 is a capable group that has carried out cyber espionage operations since at least 2013. We assess APT33 works at the behest of the Iranian government. GroupAPT
2.3.24LightBasinUNC1945 is an APT group that has been targeting telecommunications companies globally. They use Linux-based implants to maintain long-term access in compromised networks. GroupAPT
1.3.24UNC1549 When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors BigBrotherCyberSpy
1.3.24UNC3886UNC3886 is an advanced cyber espionage group with unique capabilities in how they operate on-network as well as the tools they utilize in their campaigns. UNC3886 has been observed targeting firewall and virtualization technologies which lack EDR support. GroupGroup
1.3.24TortoiseshellA previously undocumented attack group is using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers. GroupGroup
1.3.24Bohrium Bohrium is an Iranian threat actor that has been involved in spear-phishing operations targeting organizations in the US, Middle East, and India. GroupGroup
19.2.24TAG-70Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign GroupGroup

6.2.24

GambleForce

Analysis of TTPs tied to GambleForce, which carried out SQL injection attacks against companies in the APAC region

Group

Group

3.2.24

COLDRIVER The Coldriver Group, also known as Callisto and SEABORGIUM, is a threat actor known to attack government organizations, think tanks, and journalists in Europe and the Caucasus regions through spearphishing campaigns. GroupGroup

3.2.24

ShuckwormShuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine GroupGroup

3.2.24

LitterDrifterMalware Spotlight – Into the Trash: Analyzing LitterDrifter GroupGroup

3.2.24

UAC-0027UAC-0027 Attack Detection: Hackers Target Ukrainian Organizations Using DIRTYMOE (PURPLEFOX) Malware GroupGroup

2.2.24

UNC5221 UNC5221: Unreported and Undetected WIREFIRE Web Shell Variant GroupCyberSpy

2.2.24

Volt Typhoon [Microsoft] Volt Typhoon, a state-sponsored actor based in China that typically focuses on espionage and information gathering. GroupGroup

1.2.24

UNC4990Evolution of UNC4990: Uncovering USB Malware's Hidden Depths GroupGroup

19.1.24

COLDRIVER Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware GroupGroup