You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/microsoft-threat-actor-naming.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,12 +17,12 @@ ms.custom:
17
17
- cx-ti
18
18
ms.topic: conceptual
19
19
search.appverid: met150
20
-
ms.date: 12/17/2024
20
+
ms.date: 12/19/2024
21
21
---
22
22
23
23
# How Microsoft names threat actors
24
24
25
-
Microsoft shifted to a new naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with the new taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.
25
+
Microsoft uses a naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with this taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.
26
26
27
27
:::image type="content" source="/defender/media/threat-actor-naming/threat-actor-categories.png" alt-text="Nation-state actors based on Microsoft naming" lightbox="/defender/media/threat-actor-naming/threat-actor-categories-lg.png":::
28
28
@@ -38,11 +38,11 @@ Microsoft categorizes threat actors into five key groups:
38
38
39
39
**Groups in development:** a temporary designation given to an unknown, emerging, or developing threat activity. This designation allows Microsoft to track a group as a discrete set of information until we can reach high confidence about the origin or identity of the actor behind the operation. Once criteria are met, a group in development is converted to a named actor or merged into existing names.
40
40
41
-
In our new taxonomy, a weather event or *family name* represents one of the above categories. For nation-state actors, we assigned a family name to a country/region of origin tied to attribution. For example, Typhoon indicates origin or attribution to China. For other actors, the family name represents a motivation. For example, Tempest indicates financially motivated actors.
41
+
In this taxonomy, a weather event or *family name* represents one of the above categories. For nation-state actors, we assigned a family name to a country/region of origin tied to attribution. For example, Typhoon indicates origin or attribution to China. For other actors, the family name represents a motivation. For example, Tempest indicates financially motivated actors.
42
42
43
43
Threat actors within the same weather family are given an adjective to distinguish actor groups with distinct tactics, techniques, and procedures (TTPs), infrastructure, objectives, or other identified patterns. For groups in development, we use a temporary designation of Storm and a four-digit number where there's a newly discovered, unknown, emerging, or developing cluster of threat activity.
44
44
45
-
The table that follows shows how the family names map to the threat actors that we track.
45
+
The following table shows how the family names map to the threat actors that we track.
46
46
47
47
|Threat actor category|Type|Family name|
48
48
|:---|:---|:---|
@@ -52,7 +52,7 @@ The table that follows shows how the family names map to the threat actors that
52
52
|Influence operations|Influence operations|Flood|
53
53
|Groups in development|Groups in development|Storm|
54
54
55
-
The table that follows lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors’ names become available.
55
+
The following table lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors’ names become available.
56
56
57
57
|Threat actor name|Origin/Threat actor category|Other names|
58
58
|:-----|:-----|:---|
@@ -181,7 +181,7 @@ The table that follows lists publicly disclosed threat actor names with their or
0 commit comments