Unveiled the Threat Actors
This article explores various threat actors known for their significant cyber attacks, detailing their origins, techniques, and famous hacks. It categorizes these actors by their affiliations, such as state-sponsored and financially motivated groups, providing insight into their behaviors and methodologies. Affected: Government networks, financial institutions, healthcare, energy sector, retail, hospitality, media, technology, and more.

Keypoints :

  • Threat actors have different naming conventions based on the cybersecurity firm, such as animal names for CrowdStrike and weather themes for Microsoft.
  • Numerous threat actors specialize in cyber espionage and financially motivated attacks across various sectors.
  • APT29 (Cozy Bear) targets government networks and has been linked to significant breaches like the SolarWinds attack.
  • APT28 (Fancy Bear) has a history of cyber attacks against military and media entities and was involved in the U.S. presidential election interference.
  • APT41 is notable for dual motivations: espionage and financial gain, particularly targeting the video game industry.
  • APT38 focuses on financial cyber operations, with notable attacks on banks globally, including a massive breach of the Bangladesh Central Bank.
  • The Lazarus Group from North Korea is notorious for cyber espionage and destructive attacks, including the Sony Pictures breach and WannaCry ransomware.
  • FIN7 has targeted restaurants and retailers with financial motives, including high-profile data breaches.
  • The Carbanak Group specializes in attacks against banks and utilizes sophisticated malware for financial theft.
  • TA505 is recognized for extensive phishing campaigns and distributing various types of malware, significantly impacting different sectors.
  • Cobalt Group primarily attacks financial institutions with malware designed for stealing money.
  • Turla conducts espionage campaigns against government and military targets using advanced techniques such as watering hole attacks and rootkits.
  • Dragonfly targets energy sector organizations through cyber espionage techniques.
  • Wizard Spider is known for ransomware attacks against multiple types of organizations, including hospitals.
  • LockBit Gang operates on an RaaS model, rapidly encrypting systems and demanding ransoms while minimizing forensic traces.


Full Story: https://infosecwriteups.com/unveiled-the-threat-actors-eb18e3221251?source=rssโ€”-7b722bfd1b8dโ€”4