Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Posted on June 3, 2025June 3, 2025 By CWS

Microsoft and CrowdStrike introduced on Monday that they’re main an business effort to map risk actor naming, with the aim of creating it simpler for the cybersecurity neighborhood to align intelligence.

There are lots of of various risk teams and so they can every have dozens of names assigned to them by the researchers and cybersecurity firms that analyze their actions. 

For example, the China-linked group also known as APT41 can also be tracked as Bronze Atlas, Earth Baku, Depraved Panda and Winnti, amongst others. The Russia-linked APT28 has not less than a dozen different names, together with Fancy Bear, Forest Blizzard, Sednit, Sofacy, and Tsar Staff.

Microsoft has been utilizing a weather-themed naming taxonomy (eg, Blizzard for Russia, Hurricane for China). CrowdStrike has been utilizing an animal-themed naming conference (eg, Panda for China, Bear for Russia, and Spider for cybercriminals). Google Cloud’s Mandiant is understood for utilizing the APT[number] and UNC[number] format.

At this level, getting all the cybersecurity business to make use of a single title for every risk group isn’t sensible and is probably not attainable, CrowdStrike famous, nevertheless it’s vital to convey readability to risk attribution throughout distributors.

As a part of the brand new initiative, Microsoft-assigned names are being mapped to different names assigned to the identical risk actor by CrowdStrike and different distributors.

“The alliance will assist the business higher correlate risk actor aliases with out imposing a single naming customary. It can develop sooner or later to incorporate different organizations that additionally follow the artwork of attribution,” CrowdStrike defined. 

“The aim: Deconflicting adversary names to construct a cohesive and enduring mapping of current naming methods to at least one one other. As well as, the place telemetry enhances each other, there’s a possibility to increase attribution throughout extra planes and vectors — constructing a richer, extra correct view of adversary campaigns that advantages all the neighborhood,” it added.

Microsoft identified that the initiative ought to assist enhance confidence in risk group identification, streamline correlation, and speed up defender motion.Commercial. Scroll to proceed studying.

“This effort isn’t about making a single naming customary,” Microsoft mentioned. “Slightly, it’s meant to assist our prospects and the broader safety neighborhood align intelligence extra simply, reply quicker, and keep forward of risk actors.”  

The tech large identified that Google (Mandiant) and Palo Alto Networks may also contribute to the mission.

It’s price noting that the Malpedia web site maintained by Germany’s Fraunhofer Institute for Communication, Info Processing and Ergonomics has been doing a great job over the previous years at holding monitor of the totally different names assigned to every risk group, together with the malware households they use. 

Nonetheless, the business may gain advantage much more from a concerted effort supported by the immense assets of firms equivalent to Microsoft, Google, CrowdStrike, and Palo Alto Networks.

Associated: Chinese language Hacking Group APT41 Exploits Google Calendar to Goal Governments

Associated: Russian APT Exploiting Mail Servers In opposition to Authorities, Protection Organizations

Associated: Ransomware Teams, Chinese language APTs Exploit Latest SAP NetWeaver Flaws

Security Week News Tags:Actor, CrowdStrike, Effort, Lead, Map, Microsoft, Names, Threat

Post navigation

Previous Post: Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
Next Post: Google Researchers Find New Chrome Zero-Day

Related Posts

Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts Security Week News
Fortinet, Ivanti Patch High-Severity Vulnerabilities Security Week News
OneDrive Gives Web Apps Full Read Access to All Files Security Week News
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover Security Week News
160,000 Impacted by Valsoft Data Breach Security Week News
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News