Threat Actor Profiles

Active threat groups tracked by our intelligence team

Scattered Spider

aka UNC3944, Octo Tempest, Star Fraud, 0ktapus

English-speaking group specializing in social engineering against enterprises. Evolved from SIM swapping to sophisticated ransomware operations. Responsible for MGM Resorts and Caesars breaches.

United States / United KingdomSince 20223 articles
financetechnologytelecommunications+2

Salt Typhoon

aka GhostEmperor, FamousSparrow, Earth Estries

Chinese MSS-linked group behind the largest telecom breach in US history. Compromised 12+ US telecom providers and accessed lawful intercept systems.

ChinaSince 20202 articles
telecommunicationsgovernmentdefense+1

LockBit

aka LockBit Black, LockBit 5.0, LockBit Green

Most prolific RaaS operation globally despite multiple law enforcement disruptions. Version 5.0 features AI-assisted target selection and automated lateral movement.

Russia / Eastern EuropeSince 20192 articles
healthcarefinancemanufacturing+2

APT29

aka Cozy Bear, The Dukes, Midnight Blizzard, Nobelium

Russian SVR-linked group conducting espionage against Western governments. Pioneered OAuth consent phishing and cloud-focused intrusion techniques. Responsible for SolarWinds compromise.

RussiaSince 20083 articles
governmentdefensetechnology+1

Lazarus Group

aka Hidden Cobra, ZINC, Diamond Sleet, APT38

North Korean state-sponsored group focused on financial theft and crypto heists to fund the regime. Also conducts espionage and destructive attacks. Responsible for $1.5B Bybit hack.

North KoreaSince 20094 articles
financetechnologydefense+1

Sandworm

aka IRIDIUM, Voodoo Bear, Seashell Blizzard, APT44

Russian GRU Unit 74455. Most destructive cyber threat actor globally. Responsible for NotPetya, Ukraine power grid attacks, and ongoing cyber operations against Ukrainian infrastructure.

RussiaSince 20093 articles
energygovernmenttelecommunications+2

APT28

aka Fancy Bear, Sofacy, Pawn Storm, Forest Blizzard

Russian GRU Unit 26165. Targets NATO governments, military, and media. Known for hack-and-leak operations and zero-day exploitation. Active in disinformation campaigns.

RussiaSince 20043 articles
governmentdefensetechnology+1

Volt Typhoon

aka BRONZE SILHOUETTE, Vanguard Panda, Insidious Taurus

Chinese state-sponsored actor pre-positioned in US critical infrastructure. Confirmed access to water, energy, transportation, and telecom systems. Uses exclusively living-off-the-land techniques.

ChinaSince 20212 articles
energytelecommunicationsgovernment+2

Play Ransomware

aka PlayCrypt, Balloonfly

Ransomware group exploiting FortiOS and Microsoft Exchange vulnerabilities. Known for rapid encryption and targeting managed service providers for downstream access.

RussiaSince 20221 articles
technologyfinancemanufacturing+2

Cl0p

aka TA505, FIN11, Lace Tempest

Financially motivated group specializing in mass exploitation of file transfer appliances. Responsible for MOVEit, GoAnywhere, Accellion, and Cleo campaigns affecting thousands of organizations.

Russia / UkraineSince 20193 articles
financehealthcaregovernment+2

Black Basta

aka Storm-1811, Cardinal

Ransomware group believed to include former Conti members. Known for using Microsoft Teams social engineering and Quick Assist for initial access. Targets large enterprises.

RussiaSince 20222 articles
manufacturingfinancehealthcare+2

Medusa

aka MedusaLocker

Ransomware group operating a leak site with countdown timers. Targets healthcare and education with increasing sophistication. Offers data deletion for additional payment.

UnknownSince 20231 articles
healthcareeducationgovernment+1

UNC3886

China-nexus espionage actor targeting network edge devices and hypervisors. Exploits zero-days in Fortinet, VMware, and Juniper. Deploys firmware-level implants for persistence.

ChinaSince 20223 articles
governmentdefensetelecommunications+1

Flax Typhoon

aka Ethereal Panda, RedJuliett

Chinese state-sponsored group operating a massive IoT botnet of compromised routers and cameras for espionage proxy networks. Targets Taiwan, Southeast Asia, and US entities.

ChinaSince 20211 articles
governmenttelecommunicationstechnology+1

Rhysida

aka Vice Society

Ransomware group targeting healthcare, education, and government. Known for auctioning stolen data. Linked to former Vice Society operators.

UnknownSince 20231 articles
healthcareeducationgovernment+1

ALPHV/BlackCat

aka BlackCat, Noberus, Cicada3301

Sophisticated RaaS group that pioneered Rust-based ransomware. After apparent exit scam in 2024, affiliates regrouped under Cicada3301 and RansomHub brands.

Russia / Eastern EuropeSince 20211 articles
healthcarefinancegovernment+2