Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Posted on June 3, 2025June 3, 2025 By CWS

Microsoft and CrowdStrike introduced on Monday that they’re main an business effort to map risk actor naming, with the aim of creating it simpler for the cybersecurity neighborhood to align intelligence.

There are lots of of various risk teams and so they can every have dozens of names assigned to them by the researchers and cybersecurity firms that analyze their actions. 

For example, the China-linked group also known as APT41 can also be tracked as Bronze Atlas, Earth Baku, Depraved Panda and Winnti, amongst others. The Russia-linked APT28 has not less than a dozen different names, together with Fancy Bear, Forest Blizzard, Sednit, Sofacy, and Tsar Staff.

Microsoft has been utilizing a weather-themed naming taxonomy (eg, Blizzard for Russia, Hurricane for China). CrowdStrike has been utilizing an animal-themed naming conference (eg, Panda for China, Bear for Russia, and Spider for cybercriminals). Google Cloud’s Mandiant is understood for utilizing the APT[number] and UNC[number] format.

At this level, getting all the cybersecurity business to make use of a single title for every risk group isn’t sensible and is probably not attainable, CrowdStrike famous, nevertheless it’s vital to convey readability to risk attribution throughout distributors.

As a part of the brand new initiative, Microsoft-assigned names are being mapped to different names assigned to the identical risk actor by CrowdStrike and different distributors.

“The alliance will assist the business higher correlate risk actor aliases with out imposing a single naming customary. It can develop sooner or later to incorporate different organizations that additionally follow the artwork of attribution,” CrowdStrike defined. 

“The aim: Deconflicting adversary names to construct a cohesive and enduring mapping of current naming methods to at least one one other. As well as, the place telemetry enhances each other, there’s a possibility to increase attribution throughout extra planes and vectors — constructing a richer, extra correct view of adversary campaigns that advantages all the neighborhood,” it added.

Microsoft identified that the initiative ought to assist enhance confidence in risk group identification, streamline correlation, and speed up defender motion.Commercial. Scroll to proceed studying.

“This effort isn’t about making a single naming customary,” Microsoft mentioned. “Slightly, it’s meant to assist our prospects and the broader safety neighborhood align intelligence extra simply, reply quicker, and keep forward of risk actors.”  

The tech large identified that Google (Mandiant) and Palo Alto Networks may also contribute to the mission.

It’s price noting that the Malpedia web site maintained by Germany’s Fraunhofer Institute for Communication, Info Processing and Ergonomics has been doing a great job over the previous years at holding monitor of the totally different names assigned to every risk group, together with the malware households they use. 

Nonetheless, the business may gain advantage much more from a concerted effort supported by the immense assets of firms equivalent to Microsoft, Google, CrowdStrike, and Palo Alto Networks.

Associated: Chinese language Hacking Group APT41 Exploits Google Calendar to Goal Governments

Associated: Russian APT Exploiting Mail Servers In opposition to Authorities, Protection Organizations

Associated: Ransomware Teams, Chinese language APTs Exploit Latest SAP NetWeaver Flaws

Security Week News Tags:Actor, CrowdStrike, Effort, Lead, Map, Microsoft, Names, Threat

Post navigation

Previous Post: Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
Next Post: Google Researchers Find New Chrome Zero-Day

Related Posts

Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed Security Week News
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Security Week News
Dozens of SysAid Instances Vulnerable to Remote Hacking Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News