Threat Actor Profiles
Unmasking cyber adversaries for proactive defense.
Overview
Protecting your organization in the digital world requires understanding the various cyber threats you face. Different attackers have different goals and methods, and knowing these can help you build better defenses. By learning about threat actors, their motivations, and potential impacts, you can significantly improve your cybersecurity posture. This knowledge empowers you to make informed decisions about your security measures and stay ahead of cybercriminals.

Scattered Spider is a financially motivated ransomware group that has various aliases including The Com, Muddled Libra, UNC3944, Starfraud, Octo Tempest, and Scatter Swine. This threat actor primarily targets large organizations in the hospitality, entertainment, technology, retail, telecommunications, and business process outsourcing sectors. Known for its sophisticated social engineering tactics and data exfiltration extortion schemes, Scattered Spider has been active since May 2022 and remains very active.

APT41 is a highly sophisticated and very active Chinese state-sponsored advanced persistent threat (APT) group. It engages in both cyber espionage and financially motivated cybercrime activities. APT41 is known by numerous aliases, including Barium, Wicked Panda, Wicked Spider, Double Dragon, Blackfly and Bronze Atlas. The group’s motivations are multifaceted, involving information theft and espionage for state interests, financial gain through cybercriminal activities, and potentially sabotage.

ToddyCat is an advanced persistent threat (APT) group engaged in cyber espionage operations, primarily targeting governmental and military entities within Europe and Asia. The group utilizes sophisticated backdoors and advanced infiltration techniques to achieve its espionage objectives. ToddyCat does not have any publicly recognized aliases attributed by cybersecurity companies. Its motivations are primarily aligned with information theft and espionage.

APT39 is a cyber espionage group primarily attributed to the Iranian Ministry of Intelligence and Security (MOIS). It is classified as a state-sponsored Advanced Persistent Threat (APT) group, also known by aliases such as Chafer, REMIX KITTEN, COBALT HICKMAN, ITG07, and Cadelspy. The group’s motivations are primarily focused on information theft and espionage, targeting individuals and entities deemed threats by the Iranian government.

UNC5812 is a Russian espionage and influence operation that targets Ukrainian military recruits and engages in disinformation campaigns. This threat actor primarily uses malware delivery via Telegram channels and websites to compromise devices while spreading anti-mobilization narratives.