Skip to content

Commit ca8ac86

Browse files
Merge pull request #4974 from MicrosoftDocs/main
[AutoPublish] main to live - 09/08 22:30 PDT | 09/09 11:00 IST
2 parents 9b89bd9 + 3865d60 commit ca8ac86

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
ms.topic: article
2020
search.appverid: met150
21-
ms.date: 8/11/2025
21+
ms.date: 09/08/2025
2222
---
2323

2424
# How Microsoft names threat actors
@@ -81,6 +81,7 @@ The following table lists publicly disclosed threat actor names with their origi
8181
|Crescent Typhoon|China|CESIUM|
8282
|Crimson Sandstorm|Iran|CURIUM, IMPERIAL KITTEN, Tortoise Shell, HOUSEBLEND, TA456|
8383
|Cuboid Sandstorm|Iran|DEV-0228, IMPERIAL KITTEN|
84+
| Daffodil Gust| United Arab Emirates | Stealth Falcon, Fruity Armor, Project Raven |
8485
|[Denim Tsunami](https://www.microsoft.com/en-us/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/)|Austria, Private sector offensive actor|DEV-0291|
8586
|[Diamond Sleet](https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/)|North Korea|ZINC, LABYRINTH CHOLLIMA, Black Artemis, Lazarus|
8687
|Emerald Sleet|North Korea|THALLIUM, VELVET CHOLLIMA, RGB-D5, Black Banshee, Kimsuky, Greendinosa|
@@ -150,12 +151,13 @@ The following table lists publicly disclosed threat actor names with their origi
150151
|Storm-0216|Financially motivated|TUNNEL SPIDER, UNC2198|
151152
|Storm-0230|Group in development|WIZARD SPIDER, Conti Team 1|
152153
|Storm-0247|China|ToddyCat, Websiic|
154+
| [Storm-0249](https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/) | Group in development ||
153155
|Storm-0252|Group in development|CHATTY SPIDER|
154156
|Storm-0288|Group in development|FIN8|
155157
|Storm-0302|Group in development|NARWHAL SPIDER, TA544|
156158
|[Storm-0408](https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/)|Group in development||
157159
|[Storm-0485](https://www.microsoft.com/en-us/security/blog/2025/05/29/defending-against-evolving-identity-attack-techniques/)|Group in development||
158-
|[Storm-0501](https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/)|Financially motivated||
160+
| [Storm-0501](https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/) | Financially motivated ||
159161
|Storm-0538|Group in development|SKELETON SPIDER, FIN6|
160162
|[Storm-0539](https://www.microsoft.com/en-us/security/blog/2024/05/23/cyber-signals-inside-the-growing-risk-of-gift-card-fraud/)|Financially motivated||
161163
|[Storm-0569](https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/)|Financially motivated||
@@ -170,6 +172,7 @@ The following table lists publicly disclosed threat actor names with their origi
170172
|[Storm-1249](https://www.microsoft.com/en-us/security/blog/2025/05/29/defending-against-evolving-identity-attack-techniques/)|Group in development||
171173
|Storm-1516|Russia, Influence operations||
172174
|[Storm-1567](https://www.microsoft.com/en-us/security/blog/2023/10/11/automatic-disruption-of-human-operated-attacks-through-containment-of-compromised-user-accounts/)|Financially motivated|PUNK SPIDER|
175+
| [Storm-1607](https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/) | Group in development ||
173176
|[Storm-1674](https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/)|Financially motivated||
174177
|[Storm-1679](https://blogs.microsoft.com/on-the-issues/2024/09/17/russian-election-interference-efforts-focus-on-the-harris-walz-campaign/)|Influence operations||
175178
|[Storm-1811](https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/)|Financially motivated|CURLY SPIDER|

0 commit comments

Comments
 (0)