Group 2025    2026()  2025()  2024()

27.12.25

UNG0801

Key Targets. Industries Affected. Geographical Focus. Infection Chain – Operation IconCat. Infection Chain – I. Infection Chain – II. Campaign-Analysis – Operation IconCat. Campaign-I Initial Findings. Looking into the malicious PDF File. Technical Analysis. Malicious PyInstaller implant – PYTRIC...

GROUP

GROUP

12.12.25

AridViper

AridViper, an intrusion set allegedly associated with Hamas

GROUP

GROUP

28.11.25

Bloody Wolf

Bloody Wolf: A Blunt Crowbar Threat To Justice

GROUP

GROUP

25.11.25

ToddyCat

ToddyCat: your hidden email assistant. Part 1

GROUP

GROUP

6.11.25

Curly COMrades

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

GROUP

GROUP

5.11.25

UNK_SmudgedSerpent

Crossed wires: a case study of Iranian espionage and attribution

GROUP

GROUP

2.11.25

CryptoChameleon

CryptoChameleon: New Phishing Tactics Exhibited in FCC-Targeted Attack

GROUP

GROUP

1.11.25

Hezi Rash

Hezi Rash: Rising Kurdish Hacktivist Group Targets Global Sites

GROUP

GROUP

1.11.25

UNC6384

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities

GROUP

GROUP

30.10.25

UTG-Q-010

Cyber ​​Warfare Amidst Gold's Skyrocketing Price: UTG-Q-010 Group's Supply Chain Attack Strike Directly at the Heart of HongKong's Financial Market

GROUP

GROUP

17.10.25

Famous Chollima

Famous Chollima deploying Python version of GolangGhost RAT

GROUP

GROUP

17.10.25

Vanilla Tempest

Vice Society is a ransomware group that has been active since at least June 2021.

GROUP

RANSOMWARE

17.10.25

DPRK

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains

GROUP

GROUP

17.10.25

UNC5142

New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware

GROUP

GROUP

16.10.25

TA585

When the monster bytes: tracking TA585 and its arsenal

GROUP

GROUP

12.10.25

Warlock

Warlock: Professional Development, China Ties, and the Multiple Variants it Planned from the Start

GROUP

RANSOMWARE

11.10.25

UNC1151

UNC1151 Assessed with High Confidence to have Links to Belarus, Ghostwriter Campaign Aligned with Belarusian Government Interests

GROUP

GROUP

10.10.25

UAC-0226

UAC-0226 is a cyber-espionage group targeting Ukrainian military, law enforcement, and local government entities—particularly near the eastern border—since February 2025.

GROUP

GROUP

10.10.25

UAC-0219

UAC-0219 is a hacking group observed conducting cyber-espionage operations targeting Ukrainian critical sectors, primarily utilising WRECKSTEEL malware for file exfiltration in both VBScript and PowerShell variants.

GROUP

GROUP

10.10.25

UAC-0218

UAC-0218 Attack Detection: Adversaries Steal Files Using HOMESTEEL Malware

GROUP

GROUP

8.10.25

BatShadow

BatShadow: Vietnamese Threat Actor Expands Its Digital Operations

GROUP

GROUP

5.10.25

UNC5174

UNC5174, a Chinese state-sponsored threat actor, has been identified by Mandiant for exploiting critical vulnerabilities in F5 BIG-IP and ScreenConnect. They have been linked to targeting research and education institutions, businesses, charities, NGOs, and government organizations in Southeast Asia, the U.S., and the UK

GROUP

GROUP

4.10.25

TAG-124

TAG-124’s Multi-Layered TDS Infrastructure and Extensive User Base

GROUP

GROUP

4.10.25

Hive0145

Hive0145 back in German inboxes with Strela Stealer and a backdoor

GROUP

GROUP

4.10.25

Confucius

Confucius threat group evolves from document stealers to Python backdoors, showcasing the growing sophistication of state-aligned cyber campaigns

GROUP

GROUP

4.10.25

Phantom Taurus

Phantom Taurus is a previously undocumented nation-state actor whose espionage operations align with People’s Republic of China (PRC) state interests. Over the past two and a half years, Unit 42 researchers have observed Phantom Taurus targeting government and telecommunications organizations across Africa, the Middle East, and Asia.

GROUP

GROUP

4.10.25

UAT-8099

UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud

GROUP

GROUP

4.10.25

Detour Dog

GROUP

GROUP

GROUP

26.9.25

COLDRIVER

COLDRIVER Updates Arsenal with BAITSWITCH and SIMPLEFIX

GROUP

GROUP

26.9.25

Vane Viper

DNS-Driven Insights into a Malicious Ad Network

GROUP

GROUP

25.9.25

RedNovember

RedNovember Targets Government, Defense, and Technology Organizations

GROUP

GROUP

13.9.25

Scattered LAPSUS$

The Cybercrime Group Redefining Threats

GROUP

GROUP

12.9.25

Cloud Atlas

Cloud Atlas seen using a new tool in its attacks

GROUP

GROUP

30.8.25

COOKIE SPIDER

Falcon Platform Prevents COOKIE SPIDER’s SHAMOS Delivery on macOS

GROUP

GROUP

27.8.25

UNC6395

Widespread Data Theft Targets Salesforce Instances via Salesloft Drift

GROUP

GROUP

27.8.25

TAG-144

TAG-144’s Persistent Grip on South American Organizations

GROUP

GROUP

22.8.25

MURKY PANDA

MURKY PANDA: A Trusted-Relationship Threat in the Cloud

GROUP

GROUP

17.8.25

UAT-7237

UAT-7237 targets Taiwanese web hosting infrastructure

GROUP

GROUP

22.7.25

PoisonSeed

PoisonSeed downgrading FIDO key authentications to ‘fetch’ user accounts

GROUP

GROUP

19.7.25

APT PROFILE – FANCY BEAR

Fancy Bear, also known as APT28, is a notorious Russian cyberespionage group with a long history of targeting governments, military entities, and other high-value

GROUP

APT

19.7.25

UNG0002

UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions

GROUP

APT

16.7.25

GLOBAL GROUP

GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates

GROUP

RANSOMWARE

28.6.25

UAC-0226

UAC-0226 is a cyber-espionage group targeting Ukrainian military, law enforcement, and local government entities—particularly near the eastern border—since February 2025.

GROUP

GROUP

27.6.25

Hive0154

Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor

GROUP

GROUP

26.6.25

Dire Wolf

Dire Wolf Strikes: New Ransomware Group Targeting Global Sectors

GROUP

GROUP

20.6.25

Blue(Noroff)

Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion

GROUP

GROUP

11.6.25

FIN6

Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery

GROUP

GROUP

5.6.25

Bitter Group

Bitter Group Distributes CHM Malware to Chinese Organizations

GROUP

GROUP

5.6.25

UNC6040

The Cost of a Call: From Voice Phishing to Data Extortion

GROUP

GROUP

3.6.25

JINX-0132

The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul.

GROUP

GROUP

27.5.25

Void Blizzard

New Russia-affiliated actor Void Blizzard targets critical sectors for espionage

GROUP

GROUP

27.5.25

TAG-110

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents

GROUP

GROUP

22.5.25

UAT-6382

UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware

GROUP

GROUP

20.5.25

Hazy Hawk

From banks to battalions: SideWinder’s attacks on South Asia’s public sector

GROUP

APT

26.4.25

ToyMaker

Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs

GROUP

IAB

24.4.25

UNC4736

UNC4736 is a North Korean threat actor that has been involved in supply chain attacks targeting software chains of 3CX and X_TRADER. They have used malware strains such as TAXHAUL, Coldcat, and VEILEDSIGNAL to compromise Windows and macOS systems.

GROUP

GROUP

24.4.25

UNC1069

(Active since at least April 2018), which targets diverse industries for financial gain using social engineering ploys by sending fake meeting invites and posing as investors from reputable companies on Telegram to gain access to victims' digital assets and cryptocurrency

GROUP

GROUP

24.4.25

UNC4899

(Active since 2022), which is known for orchestrating job-themed campaigns that deliver malware as part of a supposed coding assignment and has previously staged supply chain compromises for financial gain (Overlaps with Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor)

GROUP

GROUP

24.4.25

UNC5342

(Active since at least December 2022), which is also known for employing job-related lures to trick developers into running malware-laced projects (Overlaps with Contagious Interview, DeceptiveDevelopment, DEV#POPPER, and Famous Chollima)

GROUP

GROUP

22.4.25

Billbug

Billbug: Intrusion Campaign Against Southeast Asia Continues

GROUP

Espionage group

22.4.25

Larva-24005

During the breach investigation process, the AhnLab SEcurity intelligence Center (ASEC) discovered a new operation related to the Kimsuky group and named it Larva-24005.1

GROUP

APT Group Profiles

22.4.25

Proton66

Proton66 Part 1: Mass Scanning and Exploit Campaigns

GROUP

GROUP

16.4.25

UNC5174

UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

GROUP

GROUP

15.4.25

Slow Pisces

Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware

GROUP

GROUP

11.4.25

Core Werewolf

Core Werewolf hones its arsenal against Russia’s government organizations

GROUP

GROUP

11.4.25

Venture Wolf

Venture Wolf attempts to disrupt Russian businesses with MetaStealer

GROUP

GROUP

11.4.25

NOVA

Attackers use a fork of a popular stealer to target Russian companies

GROUP

GROUP

11.4.25

Bloody Wolf

Bloody Wolf evolution: new targets, new tools

GROUP

GROUP

11.4.25

Sapphire Werewolf

Sapphire Werewolf refines Amethyst stealer to attack energy companies

GROUP

GROUP

11.4.25

GOFFEE

GOFFEE continues to attack organizations in Russia

GROUP

GROUP

10.4.25

Everest Ransomware Group

Threat Actor Profile

GROUP

Ransomware

4.4.25

Proton66

Bulletproof Hosting Networks and Proton66

GROUP

GROUP

27.3.25

FamousSparrow

You will always remember this as the day you finally caught FamousSparrow

GROUP

APT

26.3.25

RedCurl

In mid to late 2024, Huntress uncovered activity across several organizations in Canada, with similar infrastructure and TTPs used that can be associated with the APT group known as RedCurl (aka Earth Kapre and Red Wolf).

GROUP

APT

25.3.25

Elephant Beetle

Elephant Beetle: Uncovering an Organized Financial-Theft Operation

GROUP

GROUP

25.3.25

Weaver Ant

Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation

GROUP

GROUP

21.3.25

UAT-5918

UAT-5918 targets critical infrastructure entities in Taiwan

GROUP

GROUP

21.3.25

-=TWELVE=

-=TWELVE=- is back

GROUP

GROUP

21.3.25

Head Mare

Head Mare: adventures of a unicorn in Russia and Belarus

GROUP

GROUP

13.3.25

Actor UNC3886

Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers

GROUP

GROUP

8.3.25

LARVA-208

(EncryptHub) is a threat actor that has come to the forefront with highly sophisticated spear-phishing attacks since 26 June 2024.

GROUP

GROUP

6.3.25

Silk Typhoon

Silk Typhoon targeting IT supply chain

GROUP

APT

6.3.25

Dark Caracal

The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT

GROUP

APT

6.3.25

Lotus Panda

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

GROUP

APT

4.3.25

JavaGhost’s

JavaGhost’s Persistent Phishing Attacks From the Cloud

GROUP

GROUP

27.2.25

TraderTraitor

TraderTraitor: North Korean State-Sponsored
APT Targets Blockchain Companies

GROUP

GROUP

26.2.25

UNC1151

UNC1151 Strikes Again: Unveiling Their Tactics Against Ukraine’s Ministry of Defence

GROUP

GROUP

22.2.25

Salt Typhoon

Weathering the storm: In the midst of a Typhoon

GROUP

APT

15.2.25

Storm-2372

Storm-2372 conducts device code phishing campaign

GROUP

Phishing

27.1.25

GamaCopy

Love and hate under war: The GamaCopy organization, which imitates the Russian Gamaredon, uses military — related bait to launch attacks on Russia

GROUP

GROUP

25.1.25

UAC-0063

UAC-0063: Cyber Espionage Operation Expanding from Central Asia

GROUP

GROUP

16.1.25

NICKEL TAPESTRY

NICKEL TAPESTRY Infrastructure Associated with Crowdfunding Scheme

GROUP

GROUP

14.1.25

UAC-0063

Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations

GROUP

GROUP

10.2.25

DragonRank

Trend Micro researchers observed an SEO manipulation campaign that highlights the need for organizations using Internet Information Services (IIS) to proactively update and patch systems to prevent exploitation by threat actors that use malware like BadIIS in their campaigns.

GROUP

Campaigns

10.1.25

RedDelta

Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain

GROUP

GROUP

10.1.25

MirrorFace

China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019.

GROUP

GROUP