Edit

Share via


How Microsoft names threat actors

Microsoft uses a naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with this taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.

Nation-state actors based on Microsoft naming

Microsoft categorizes threat actors into five key groups:

Nation-state actors: cyber operators acting on behalf of or directed by a nation/state-aligned program, irrespective of whether for espionage, financial gain, or retribution. Microsoft observed that most nation state actors continue to focus operations and attacks on government agencies, intergovernmental organizations, nongovernmental organizations, and think tanks for traditional espionage or surveillance objectives.

Financially motivated actors: cyber campaigns/groups directed by a criminal organization/person with motivations of financial gain and aren't associated with high confidence to a known non-nation state or commercial entity. This category includes ransomware operators, business email compromise, phishing, and other groups with purely financial or extortion motivations.

Private sector offensive actors (PSOAs): cyber activity led by commercial actors that are known/legitimate legal entities, that create and sell cyberweapons to customers who then select targets and operate the cyberweapons. These tools were observed targeting and surveiling dissidents, human rights defenders, journalists, civil society advocates, and other private citizens, threatening many global human rights efforts.

Influence operations: information campaigns communicated online or offline in a manipulative fashion to shift perceptions, behaviors, or decisions by target audiences to further a group or a nation's interests and objectives.

Groups in development: a temporary designation given to an unknown, emerging, or developing threat activity. This designation allows Microsoft to track a group as a discrete set of information until we can reach high confidence about the origin or identity of the actor behind the operation. Once criteria are met, a group in development is converted to a named actor or merged into existing names.

In this taxonomy, a weather event or family name represents one of the above categories. For nation-state actors, we assigned a family name to a country/region of origin tied to attribution. For example, Typhoon indicates origin or attribution to China. For other actors, the family name represents a motivation. For example, Tempest indicates financially motivated actors.

Threat actors within the same weather family are given an adjective to distinguish actor groups with distinct tactics, techniques, and procedures (TTPs), infrastructure, objectives, or other identified patterns. For groups in development, we use a temporary designation of Storm and a four-digit number where there's a newly discovered, unknown, emerging, or developing cluster of threat activity.

The following table shows how the family names map to the threat actors that we track.

Threat actor categoryTypeFamily name
Nation-stateChina
Germany
India
Iran
North Korea
Lebanon
Pakistan
Palestinian Authority
Russia
Singapore
South Korea
Spain
Syria
Türkiye
Ukraine
United States
Vietnam
Typhoon
Gale
Monsoon
Sandstorm
Sleet
Rain
Whirlwind
Lightning
Blizzard
Squall
Hail
Derecho
Haze
Dust
Frost
Tornado
Cyclone
Financially motivatedFinancially motivatedTempest
Private sector offensive actorsPSOAsTsunami
Influence operationsInfluence operationsFlood
Groups in developmentGroups in developmentStorm

The following table lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors' names become available.

Threat actor nameOrigin/Threat actor categoryOther names
Amethyst RainLebanonVolatile Cedar
Antique TyphoonChinaStorm-0558
Aqua BlizzardRussiaACTINIUM, Gamaredon, Armageddon, UNC530, shuckworm, SectorC08, Primitive Bear
Berry SandstormIranStorm-0852
Blue TsunamiIsrael, Private sector offensive actor
Brass TyphoonChinaBARIUM, APT41
Brocade TyphoonChinaBORON, UPS, Gothic Panda, APT3, OLDCARP, TG-0110, Red Sylvan, CYBRAN
Burgundy SandstormIranCadelle, Chafer
Cadet BlizzardRussiaDEV-0586
Canary TyphoonChinaCIRCUIT PANDA, APT24, Palmerworm, BlackTech
Canvas CycloneVietnamBISMUTH, OceanLotus, APT32
Caramel TsunamiIsrael, Private sector offensive actorDEV-0236
Carmine TsunamiPrivate sector offensive actor
Charcoal TyphoonChinaCHROMIUM, ControlX, Aquatic Panda, RedHotel, BRONZE UNIVERSITY
Checkered TyphoonChinaCHLORINE, ATG50, APT19, TG-3551, DEEP PANDA, Red Gargoyle
Cinnamon TempestChina, Financially motivatedDEV-0401
Circle TyphoonChinaDEV-0322, APT6, APT27
Citrine SleetNorth KoreaDEV-0139, Storm-0139, Storm-1222, DEV-1222
Cotton SandstormIranNEPTUNIUM, Vice Leaker, Haywire Kitten
Crescent TyphoonChinaCESIUM
Crimson SandstormIranCURIUM, Tortoise Shell, HOUSEBLEND, TA456
Cuboid SandstormIranDEV-0228
Denim TsunamiAustria, Private sector offensive actorDEV-0291
Diamond SleetNorth KoreaZINC, Black Artemis, Labyrinth Chollima, Lazarus
Emerald SleetNorth KoreaTHALLIUM, RGB-D5, Black Banshee, Kimsuky, Greendinosa, VELVET CHOLLIMA
Fallow SquallSingaporePLATINUM, PARASITE, RUBYVINE, GINGERSNAP
Flax TyphoonChinaStorm-0919, ETHEREAL PANDA
Forest BlizzardRussiaSTRONTIUM, Sednit, ATG2, Sofacy, FANCY BEAR, Blue Athena, Z-Lom Team, Operation Pawn Storm, Tsar Team, CrisisFour, HELLFIRE, APT28
Ghost BlizzardRussiaBROMINE, TG-4192, Koala Team, ENERGETIC BEAR, Blue Kraken, Crouching Yeti, Dragonfly
Gingham TyphoonChinaGADOLINIUM, TEMP.Periscope, Leviathan, JJDoor, APT40, Feverdream
Granite TyphoonChinaGALLIUM
Gray SandstormIranDEV-0343
Hazel SandstormIranEUROPIUM, COLBALT GYPSY, Crambus, OilRig, APT34
Heart TyphoonChinaHELIUM, APT17, Hidden Lynx, ATG3, Red Typhon, KAOS, TG-8153, SportsFans, DeputyDog, AURORA PANDA, Tailgater
Hexagon TyphoonChinaHYDROGEN, Calc Team, Red Anubis, APT12, DNS-Calc, HORDE, NUMBERED PANDA
Houndstooth TyphoonChinaHASSIUM, isoon, deepclif
Jade SleetNorth KoreaStorm-0954
Lace TempestFinancially motivatedDEV-0950
Lemon SandstormIranRUBIDIUM
Leopard TyphoonChinaLEAD, TG-2633, TG-3279, Mana, KAOS, Red Diablo, Winnti Group
Lilac TyphoonChinaDEV-0234
Linen TyphoonChinaIODINE, Red Phoenix, Hippo, Lucky Mouse, EMISSARY PANDA, BOWSER, APT27, Wekby2, UNC215, TG-3390
Luna TempestFinancially motivated
Magenta DustTürkiyePROMETHIUM, StrongPity, SmallPity
Manatee TempestRussia
Mango SandstormIranMERCURY, SeedWorm, STATIC KITTEN, TEMP.Zagros, MuddyWater
Marbled DustTürkiyeSILICON, Sea Turtle, UNC1326
Marigold SandstormIranDEV-500
Midnight BlizzardRussiaNOBELIUM, UNC2452, APT29, Cozy Bear
Mint SandstormIranPHOSPHORUS, Parastoo, Newscaster, APT35, Charming Kitten
Moonstone SleetNorth KoreaStorm-1789
Mulberry TyphoonChinaMANGANESE, Backdoor-DPD, COVENANT, CYSERVICE, Bottle, Red Horus, Red Naga, Auriga, KEYHOLE PANDA, APT5, ATG48, TG-2754, tabcteng
Mustard TempestFinancially motivatedDEV-0206
Neva FloodRussia, Influence operationsStorm-1516, CopyCop
Night TsunamiIsraelDEV-0336
Nylon TyphoonChinaNICKEL, Playful Dragon, RedRiver, ke3chang, VIXEN PANDA, APT15, Mirage
Octo TempestFinancially motivated0ktapus, Scattered Spider
Onyx SleetNorth KoreaPLUTONIUM, StoneFly, Tdrop2 campaign, DarkSeoul, Black Chollima, SILENT CHOLLIMA, Andariel, APT45
Opal SleetNorth KoreaOSMIUM, Planedown, Konni, APT43
Peach SandstormIranHOLMIUM, APT33, Elfin, REFINED KITTEN
Pearl SleetNorth KoreaLAWRENCIUM
Periwinkle TempestRussiaDEV-0193
Phlox TempestIsrael, Financially motivatedDEV-0796
Pink SandstormIranAMERICIUM, Agrius, Deadwood, BlackShadow, SharpBoys, FireAnt, Justice Blade
Pinstripe LightningNIOBIUM, Desert Falcons, Scimitar, Arid Viper
Pistachio TempestFinancially motivatedDEV-0237
Plaid RainLebanonPOLONIUM
Pumpkin SandstormIranDEV-0146
Purple TyphoonChinaPOTASSIUM, GOLEM, Evilgrab, AEON, LIVESAFE, ChChes, APT10, Haymaker, Webmonder, STONE PANDA, Foxtrot, Foxmail, MenuPass, Red Apollo
Raspberry TyphoonChinaRADIUM, LotusBlossom, APT30
Red SandstormIranVoid Manticore, Storm-0842
Ruby SleetNorth KoreaCERIUM
Ruza FloodRussia, Influence operations
Salmon TyphoonChinaSODIUM, APT4, MAVERICK PANDA
Salt TyphoonChinaGhostEmperor, FamousSparrow
Sangria TempestUkraine, Financially motivatedELBRUS
Sapphire SleetNorth KoreaCOPERNICIUM, Genie Spider, BlueNoroff, CageyChameleon, CryptoCore
Satin TyphoonChinaSCANDIUM, COMBINE, TG-0416, SILVERVIPER, DYNAMITE PANDA, Red Wraith, APT18, Elderwood Group, Wekby
Seashell BlizzardRussiaIRIDIUM, BE2, UAC-0113, Blue Echidna, Sandworm, PHANTOM, BlackEnergy Lite, APT44
Secret BlizzardRussiaKRYPTON, VENOMOUS BEAR, Uroburos, Snake, Blue Python, Turla, WRAITH, ATG26
Sefid FloodIran, Influence operations
Shadow TyphoonChinaDarkShadow, Oro0lxy, Storm-0062
Silk TyphoonChinaHAFNIUM, timmy
Smoke SandstormIranUNC1549
Spandex TempestFinancially motivatedTA505
Spotted SandstormNEODYMIUM, BlackOasis
Star BlizzardRussiaSEABORGIUM, COLDRIVER, Callisto Group, BlueCharlie, TA446
Storm-0216Financially motivatedTwisted Spider, UNC2198
Storm-0230Group in developmentConti Team 1, DEV-0230
Storm-0247ChinaToddyCat, Websiic
Storm-0288Group in developmentFIN8
Storm-0302Group in developmentNarwhal Spider, TA544
Storm-0408Group in development
Storm-0501Financially motivatedDEV-0501
Storm-0538Group in developmentFIN6
Storm-0539Financially motivated
Storm-0569Financially motivatedDEV-0569
Storm-0671Group in developmentUNC2596, Tropicalscorpius
Storm-0940China
Storm-0978RussiaRomCom, Underground Team
Storm-1101Group in development
Storm-1113Financially motivated
Storm-1152Financially motivated
Storm-1175China, Financially motivated
Storm-1194Group in developmentMONTI
Storm-1567Financially motivated
Storm-1674Financially motivated
Storm-1679Influence operations
Storm-1811Financially motivated
Storm-1865Group in development
Storm-1982ChinaSneakyCheff, UNK_SweetSpecter
Storm-2035Iran, Influence operations
Storm-2077ChinaTAG-100
Strawberry TempestFinancially motivatedDEV-0537, LAPSUS$
Sunglow BlizzardDEV-0665
Swirl TyphoonChinaTELLURIUM, Tick, Bronze Butler, REDBALDKNIGHT
Taffeta TyphoonChinaTECHNETIUM, TG-0055, Red Kobold, JerseyMikes, APT26, BEARCLAW
Taizi FloodChina, Influence operationsDragonbridge, Spamouflage
Tumbleweed TyphoonChinaTHORIUM, Karst
Twill TyphoonChinaTANTALUM, BRONZE PRESIDENT, LuminousMoth, MUSTANG PANDA
Vanilla TempestFinancially motivatedDEV-0832, Vice Society
Velvet TempestFinancially motivatedDEV-0504
Violet TyphoonChinaZIRCONIUM, Chameleon, APT31, WebFans
Volga FloodRussia, Influence operationsStorm-1841, Rybar
Volt TyphoonChinaBRONZE SILHOUETTE, VANGUARD PANDA
Wheat TempestFinancially motivatedGOLD, Gatak
Wisteria TsunamiIndia, Private sector offensive actorDEV-0605
Yulong FloodChina,, Influence operationsStorm-1852
Zigzag HailSouth KoreaDUBNIUM, Nemim, TEMPLAR, TieOnJoe, Fallout Team, Purple Pygmy, Dark Hotel, Egobot, Tapaoux, PALADIN, APT-C-60

Read our announcement about this taxonomy for more information: https://aka.ms/threatactorsblog

Putting intelligence into the hands of security professionals

Intel profiles in Microsoft Defender Threat Intelligence bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.

Additionally, the Microsoft Defender Threat Intelligence Intel Profiles API provides the most up-to-date threat actor infrastructure visibility in the industry today. Updated information is crucial in enabling threat intelligence and security operations (SecOps) teams to streamline their advanced threat hunting and analysis workflows. Learn more about this API in the documentation: Use the threat intelligence APIs in Microsoft Graph (preview).

Resources

Use the following query on Microsoft Defender XDR and other Microsoft security products supporting the Kusto query language (KQL) to get information about a threat actor using the old name, new name, or industry name:

let TANames = externaldata(PreviousName: string, NewName: string, Origin: string, OtherNames: dynamic)[@"https://raw.githubusercontent.com/microsoft/mstic/master/PublicFeeds/ThreatActorNaming/MicrosoftMapping.json"] with(format="multijson", ingestionMapping='[{"Column":"PreviousName","Properties":{"Path":"$.Previous name"}},{"Column":"NewName","Properties":{"Path":"$.New name"}},{"Column":"Origin","Properties":{"Path":"$.Origin/Threat"}},{"Column":"OtherNames","Properties":{"Path":"$.Other names"}}]'); let GetThreatActorAlias = (Name: string) { TANames | where Name =~ NewName or Name =~ PreviousName or OtherNames has Name }; GetThreatActorAlias("ZINC") 

The following files containing the comprehensive mapping of old threat actor names with their new names are also available: