The task of adversary attribution and how it should be done is a controversial topic in the cyber threat intelligence community. This is because there is no standardized way of doing attribution, starting with naming the threat actors.

Each security company has its own telemetry, data, standards, procedures and confidence levels. This is the main reason why most CTI teams use their own naming scheme.

Here are some examples where the classification method is officially known:

CrowdStrike

image

Uses nickname plus species of animals, each assigned to a specific country/category:

Name Nation-state or Category
BEAR RUSSIA
BUFFALO VIETNAM
CHOLLIMA DPRK (NORTH KOREA)
CRANE ROK (REPUBLIC OF KOREA)
JACKAL HACKTIVIST
KITTEN IRAN
LEOPARD PAKISTAN
LYNX GEORGIA
OCELOT COLOMBIA
PANDA PEOPLE’S REPUBLIC OF CHINA
SPIDER ECRIME
TIGER INDIA
WOLF TURKEY

Examples


Mandiant

Uses numbered APT, FIN and UNC groups. To identify a threat group, Mandiant initially focuses on detecting tactics, techniques, and procedures (TTPs), which are behavioral activities, in order to find patterns of behavior that form clusters.

The process they follow is a dynamic one, which can be described in the following order:

Order Name Description
1 Uncategorized Threat Group (UNC) UNC determined initially using behavioral clusters
2 TEMP.[name] A candidate-name is selected once further evaluation is warranted
3 Advanced Persistent Threat (APT) or Financially Motivated Threat Group (FIN) Once the motivation is established, the appropriate type is selected, and a formal name is selected

Examples


Recorded Future

image

Uses a color plus phonetic alphabet:

Color Nation-state or Category
RED PEOPLE’S REPUBLIC OF CHINA
GREEN IRAN
PURPLE NORTH KOREA
BLUE RUSSIA
GRAY CYBERCRIME

Examples


Microsoft

image

According to a recent taxonomy update,

threat actor groups will be named after weather events. A weather event or “family name” represents either a nation-state actor attribution (e.g., Typhoon indicates origin or attribution to China) or a motivation (e.g., Tempest indicates financially motivated actors).

Name Nation-state or Category
Typhoon PEOPLE’S REPUBLIC OF CHINA
Sandstorm Iran
Rain Lebanon
Sleet North Korea
Blizzard Russia
Hail South Korea
Dust Turkey
Cyclone Vietnam
Tempest Financially motivated
Tsunami PSOAs
Flood Influence operations
Storm Groups in development

Examples


Secureworks

Uses elements plus nickname:

Element Nation-state or Category
BRONZE PEOPLE’S REPUBLIC OF CHINA
ZINC INDIA
COBALT IRAN
NICKEL NORTH COREA
TUNGSTEN SOUTH KOREA
COPPER PAKISTAN
ALUMINUM PALESTINE
IRON RUSSIA
PLATINUM UNITED STATES
TIN VIETNAM
GOLD CYBERCRIME

Examples


IBM

Uses numbered ITG or Hive. ITG stands for IBM Threat Group and is used fo both nation-state and cybercriminal. IBM tracks and names threat groups numerically, identified by IBM Threat Group (ITG) followed by an assigned number. For threat groups still in the research phase, IBM uses the designation Hive.

Examples


Proofpoint

Uses numbered TA groups. TA simply stands for Threat Actor.

Examples


Symantec

Uses species of insects.

Examples


Personally, I can only agree with researchers who simply believe that the practice of naming fictitious “groups” based on overlapping infrastructure, tools or TTPs is outdated, and that organisations should focus more on assessing the adequacy of their defences against the threat.